2060d09d80f7ee6ba3ae0b6edf87d14be34012ef95719e01f065ec7943a48dcce0fcf8f7f3a89c24d940f201c7c73a3c97872a80ca25d1a3114fe16f225f4f55f3c6456cab8f0aa59d8efdc6939eb7f2b223ceff25db5222ff8e86c024229beec9ce765151d6e706fd60ab8ffe4c2e736eec4bcae53c1aaaef"}}}, 0x120) 14:44:30 executing program 0: openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x20000260) 14:44:30 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) (async, rerun: 64) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) (rerun: 64) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r1) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x106, 0x4}}, 0x20) 14:44:30 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}}}, 0x120) 14:44:30 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r1 = fsmount(0xffffffffffffffff, 0x0, 0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, 0x0, 0x0) write$P9_RSTAT(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="575ea5a900edaed9742b9014585c2b9db73dd7d19d5be39c19e4866feca9bfdcbc82c8f635582f30d89a22450f73c5dc7d239971cc3b4597b623a962d867f46a64341092bf32776910b9b4c1a32276ee98137f3c94baabcfe7be1803a5872ce2d60bf3d74c5a71b01649fe0a98c092251ccbc277fa6a93b43456bd13710e42b6e0c6614722bc9e366226546f0b7c9464eed27ea897180e048cce9a570f711d34f16985e6dc4bd166898a7e151b57352c9a6ea8f6d3d3a11077364ba1fa22e3eb7792c863d454d139ccf2a56af209cbbdcb72e3c6ae40e9437d8ef55bb3b8a93cd46d218e", @ANYRES32=r0, @ANYRES64=r0, @ANYRES16, @ANYRES64=r1, @ANYRES64=r0], 0x4e) mq_open(&(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x9099a7243e32f16, 0x2, &(0x7f0000000140)={0x7, 0x2ec42132, 0x4, 0x5}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000280)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0, r3, 0x0, 0x3}}, 0x20) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) (async) fsmount(0xffffffffffffffff, 0x0, 0x0) (async) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, 0x0, 0x0) (async) write$P9_RSTAT(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="575ea5a900edaed9742b9014585c2b9db73dd7d19d5be39c19e4866feca9bfdcbc82c8f635582f30d89a22450f73c5dc7d239971cc3b4597b623a962d867f46a64341092bf32776910b9b4c1a32276ee98137f3c94baabcfe7be1803a5872ce2d60bf3d74c5a71b01649fe0a98c092251ccbc277fa6a93b43456bd13710e42b6e0c6614722bc9e366226546f0b7c9464eed27ea897180e048cce9a570f711d34f16985e6dc4bd166898a7e151b57352c9a6ea8f6d3d3a11077364ba1fa22e3eb7792c863d454d139ccf2a56af209cbbdcb72e3c6ae40e9437d8ef55bb3b8a93cd46d218e", @ANYRES32=r0, @ANYRES64=r0, @ANYRES16, @ANYRES64=r1, @ANYRES64=r0], 0x4e) (async) mq_open(&(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x9099a7243e32f16, 0x2, &(0x7f0000000140)={0x7, 0x2ec42132, 0x4, 0x5}) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000280)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0, r3, 0x0, 0x3}}, 0x20) (async) 14:44:30 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r1 = fsmount(0xffffffffffffffff, 0x0, 0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, 0x0, 0x0) write$P9_RSTAT(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="575ea5a900edaed9742b9014585c2b9db73dd7d19d5be39c19e4866feca9bfdcbc82c8f635582f30d89a22450f73c5dc7d239971cc3b4597b623a962d867f46a64341092bf32776910b9b4c1a32276ee98137f3c94baabcfe7be1803a5872ce2d60bf3d74c5a71b01649fe0a98c092251ccbc277fa6a93b43456bd13710e42b6e0c6614722bc9e366226546f0b7c9464eed27ea897180e048cce9a570f711d34f16985e6dc4bd166898a7e151b57352c9a6ea8f6d3d3a11077364ba1fa22e3eb7792c863d454d139ccf2a56af209cbbdcb72e3c6ae40e9437d8ef55bb3b8a93cd46d218e", @ANYRES32=r0, @ANYRES64=r0, @ANYRES16, @ANYRES64=r1, @ANYRES64=r0], 0x4e) mq_open(&(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x9099a7243e32f16, 0x2, &(0x7f0000000140)={0x7, 0x2ec42132, 0x4, 0x5}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000280)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0, r3, 0x0, 0x3}}, 0x20) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) (async) fsmount(0xffffffffffffffff, 0x0, 0x0) (async) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, 0x0, 0x0) (async) write$P9_RSTAT(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="575ea5a900edaed9742b9014585c2b9db73dd7d19d5be39c19e4866feca9bfdcbc82c8f635582f30d89a22450f73c5dc7d239971cc3b4597b623a962d867f46a64341092bf32776910b9b4c1a32276ee98137f3c94baabcfe7be1803a5872ce2d60bf3d74c5a71b01649fe0a98c092251ccbc277fa6a93b43456bd13710e42b6e0c6614722bc9e366226546f0b7c9464eed27ea897180e048cce9a570f711d34f16985e6dc4bd166898a7e151b57352c9a6ea8f6d3d3a11077364ba1fa22e3eb7792c863d454d139ccf2a56af209cbbdcb72e3c6ae40e9437d8ef55bb3b8a93cd46d218e", @ANYRES32=r0, @ANYRES64=r0, @ANYRES16, @ANYRES64=r1, @ANYRES64=r0], 0x4e) (async) mq_open(&(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x9099a7243e32f16, 0x2, &(0x7f0000000140)={0x7, 0x2ec42132, 0x4, 0x5}) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000280)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0, r3, 0x0, 0x3}}, 0x20) (async) 14:44:30 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000000)={0x15, 0x65, 0xffff, 0x5, 0x8, '9P2000.u'}, 0x15) 14:44:30 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "e0b3772264c43c79ea3709d20d36cc4637f10fb5de2d44e0a73f520c3612063189eaba7b99fa9556bcac2ba1fb34035db66efe1e7ea748d786f601d0dcc0875cb8313c7db8b6c64b414bd5a06373bc3fbdf80ab140bf4b8f6c4a991196664cd95bbff1abeb0e982cc9b17aac4b0381a35d7a53d098e99e432a3b2f69c8b9abd7356e7cc0700ff8a36c56bf3e8a01564cd35c263749dc7c61c59645ecda836dc9f9771ff0fcdeec9e4d22cc1722bacd35e0096e747dac83ef85aed84e433e8b13e27f70ad877ff1a53934e230ed382a6c4ff7a6c1d3bb2cee4b336dcd368e29a06ed88efe1806f129bfbdfccf6c5e3ba935eb8ad0af3928b311e0a1c89eca9c75"}}, 0x110) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x2}}}, 0x120) 14:44:30 executing program 0: openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x20000260) 14:44:30 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa08, {{0x0, 0x0, "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"}}}, 0x120) 14:44:30 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "e0b3772264c43c79ea3709d20d36cc4637f10fb5de2d44e0a73f520c3612063189eaba7b99fa9556bcac2ba1fb34035db66efe1e7ea748d786f601d0dcc0875cb8313c7db8b6c64b414bd5a06373bc3fbdf80ab140bf4b8f6c4a991196664cd95bbff1abeb0e982cc9b17aac4b0381a35d7a53d098e99e432a3b2f69c8b9abd7356e7cc0700ff8a36c56bf3e8a01564cd35c263749dc7c61c59645ecda836dc9f9771ff0fcdeec9e4d22cc1722bacd35e0096e747dac83ef85aed84e433e8b13e27f70ad877ff1a53934e230ed382a6c4ff7a6c1d3bb2cee4b336dcd368e29a06ed88efe1806f129bfbdfccf6c5e3ba935eb8ad0af3928b311e0a1c89eca9c75"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000100), 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) 14:44:30 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000000)={0x15, 0x65, 0xffff, 0x5, 0x8, '9P2000.u'}, 0x15) 14:44:30 executing program 0: openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x20000260) 14:44:30 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r1) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32, @ANYRES32=r2, @ANYBLOB="2e2f6669a7c53000"]) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) io_setup(0x7f, &(0x7f0000000080)=0x0) io_cancel(r3, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) r4 = syz_io_uring_setup(0x5e5d, &(0x7f0000000500)={0x0, 0x5b77, 0x4, 0x0, 0x221}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000580), &(0x7f00000005c0)) r5 = syz_io_uring_setup(0x154a, &(0x7f0000000300)={0x0, 0x1006f6f, 0x20, 0x0, 0x2fb, 0x0, r4}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000000100), &(0x7f0000000380)) io_cancel(r3, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x2, 0x5, r5, &(0x7f00000003c0)="decfa1aebd5ce717ea328d7d52ca43c1648b828db6a55153097b358eff2bda116da8f918776ab8103ecb08055a673f86b2d96426749ade9353804f5e57c65172c778eaae0551cb871d595a30d7e9552cc9708b314ef38cf545e082d871c7b0bea14290e3d657e798374f282cc68daef7b9d5aa21f5316630a9fd80f63ccfe09a3dadae2e6ae5c5f80f8cec5a39164b603d6729ed20b686d9554658c7788a81f5f2b33f98aa9872f1427295c24fa3bf6d53a98fcf81278c", 0xb7, 0xe4c, 0x0, 0x0, r0}, &(0x7f00000004c0)) 14:44:30 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000300)={0x3, 0x40, 0xfa00, {{0xa, 0x4e20, 0xffff, @mcast1, 0x785089d7}, {0xa, 0x4e23, 0x39, @empty, 0x5}, 0xffffffffffffffff, 0x7f}}, 0x48) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r1) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000280)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000140)=[{0x19, 0x0, [0x10000, 0x2, 0x4, 0x1, 0x7, 0xc13, 0x8, 0x1, 0xfff, 0x200, 0x2, 0x5, 0x1000, 0x8, 0x1, 0x80000001]}, {0x4, 0x0, [0x7f, 0x8000, 0x6, 0x800, 0xff, 0x7, 0x7fffffff, 0xd7ca, 0xffffffff, 0x58, 0x4581, 0x9, 0x3, 0xdf, 0x9, 0x8]}, {0x24, 0x0, [0x9, 0x7fffffff, 0x0, 0x200, 0x9, 0x7ff, 0x7fff, 0x7, 0x30000, 0x4439, 0x0, 0x5, 0x68, 0x0, 0x8, 0x2]}], r2, 0x1, 0x1, 0xd8}}, 0x20) 14:44:30 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x20000260) (fail_nth: 1) 14:44:30 executing program 3: write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000)=0x1, 0xffffffffffffffff, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(0xffffffffffffffff, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000100), 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) [ 3577.572299][ T3606] FAULT_INJECTION: forcing a failure. [ 3577.572299][ T3606] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3577.585670][ T3606] CPU: 1 PID: 3606 Comm: syz-executor.1 Not tainted 5.17.0-rc2-syzkaller-00167-gdcb85f85fa6f-dirty #0 [ 3577.596605][ T3606] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3577.606728][ T3606] Call Trace: [ 3577.610030][ T3606] [ 3577.612962][ T3606] dump_stack_lvl+0xd6/0x122 [ 3577.617567][ T3606] dump_stack+0x11/0x1b [ 3577.621737][ T3606] should_fail+0x23c/0x250 [ 3577.626159][ T3606] __alloc_pages+0x102/0x330 [ 3577.630835][ T3606] alloc_pages_vma+0x67e/0x810 [ 3577.635603][ T3606] ? percpu_counter_add_batch+0x109/0x130 [ 3577.641341][ T3606] shmem_getpage_gfp+0x8b4/0x12c0 [ 3577.646372][ T3606] ? do_user_addr_fault+0x7d4/0xb90 [ 3577.651587][ T3606] shmem_write_begin+0x7e/0x100 [ 3577.656450][ T3606] generic_perform_write+0x1c8/0x400 [ 3577.661741][ T3606] ? current_time+0xed/0x1a0 [ 3577.666446][ T3606] __generic_file_write_iter+0xf7/0x2b0 14:44:30 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000000)={0x15, 0x65, 0xffff, 0x5, 0x8, '9P2000.u'}, 0x15) openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) (async) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000000)={0x15, 0x65, 0xffff, 0x5, 0x8, '9P2000.u'}, 0x15) (async) 14:44:30 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, 0x0, 0x0) 14:44:30 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f00000002c0)={0xc, 0x8, 0xfa00, {&(0x7f0000000140)}}, 0x10) r1 = fsmount(0xffffffffffffffff, 0x0, 0xc) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) time(&(0x7f00000003c0)) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r4) io_cancel(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) clock_gettime(0x0, &(0x7f00000005c0)={0x0, 0x0}) io_getevents(0x0, 0x2, 0x5, &(0x7f0000000500)=[{}, {}, {}, {}, {}], &(0x7f0000000600)={r5, r6+60000000}) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000100)={0x0, 0x10, 0xfa00, {0x2, &(0x7f00000000c0)={0xffffffffffffffff}, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r7}}, 0x10) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f00000004c0)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000400)=[{0x38, 0x0, [0x1ff, 0x4, 0x40, 0x2, 0x7, 0x9, 0x8, 0x6, 0x2, 0x0, 0xffff, 0xffff, 0x9, 0xf4, 0x3ff, 0x2]}, {0x8, 0x0, [0x0, 0x6, 0x9, 0x3, 0x0, 0x9, 0x52c, 0x8, 0x5, 0x94, 0x9, 0x4, 0x1, 0x1000, 0x5]}], r7, 0x1, 0x1, 0x90}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000340)={0xf, 0x8, 0xfa00, {r7, 0x1}}, 0x10) r8 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r8) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r8, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xffffffffffffffff, 0xee00}}, './file0\x00'}) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000000)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x1, "b18126", "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"}}, 0x110) 14:44:30 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, 0x0, 0x0) 14:44:30 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f00000002c0)={0xc, 0x8, 0xfa00, {&(0x7f0000000140)}}, 0x10) (async) r1 = fsmount(0xffffffffffffffff, 0x0, 0xc) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) time(&(0x7f00000003c0)) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r4) (async) io_cancel(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) (async) clock_gettime(0x0, &(0x7f00000005c0)={0x0, 0x0}) io_getevents(0x0, 0x2, 0x5, &(0x7f0000000500)=[{}, {}, {}, {}, {}], &(0x7f0000000600)={r5, r6+60000000}) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000100)={0x0, 0x10, 0xfa00, {0x2, &(0x7f00000000c0)={0xffffffffffffffff}, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r7}}, 0x10) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f00000004c0)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000400)=[{0x38, 0x0, [0x1ff, 0x4, 0x40, 0x2, 0x7, 0x9, 0x8, 0x6, 0x2, 0x0, 0xffff, 0xffff, 0x9, 0xf4, 0x3ff, 0x2]}, {0x8, 0x0, [0x0, 0x6, 0x9, 0x3, 0x0, 0x9, 0x52c, 0x8, 0x5, 0x94, 0x9, 0x4, 0x1, 0x1000, 0x5]}], r7, 0x1, 0x1, 0x90}}, 0x20) (async) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000340)={0xf, 0x8, 0xfa00, {r7, 0x1}}, 0x10) (async) r8 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r8) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r8, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xffffffffffffffff, 0xee00}}, './file0\x00'}) (async) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000000)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x1, "b18126", "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"}}, 0x110) 14:44:30 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f00000002c0)={0xc, 0x8, 0xfa00, {&(0x7f0000000140)}}, 0x10) r1 = fsmount(0xffffffffffffffff, 0x0, 0xc) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) time(&(0x7f00000003c0)) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r4) io_cancel(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) clock_gettime(0x0, &(0x7f00000005c0)={0x0, 0x0}) io_getevents(0x0, 0x2, 0x5, &(0x7f0000000500)=[{}, {}, {}, {}, {}], &(0x7f0000000600)={r5, r6+60000000}) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000100)={0x0, 0x10, 0xfa00, {0x2, &(0x7f00000000c0)={0xffffffffffffffff}, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r7}}, 0x10) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f00000004c0)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000400)=[{0x38, 0x0, [0x1ff, 0x4, 0x40, 0x2, 0x7, 0x9, 0x8, 0x6, 0x2, 0x0, 0xffff, 0xffff, 0x9, 0xf4, 0x3ff, 0x2]}, {0x8, 0x0, [0x0, 0x6, 0x9, 0x3, 0x0, 0x9, 0x52c, 0x8, 0x5, 0x94, 0x9, 0x4, 0x1, 0x1000, 0x5]}], r7, 0x1, 0x1, 0x90}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000340)={0xf, 0x8, 0xfa00, {r7, 0x1}}, 0x10) r8 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r8) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r8, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xffffffffffffffff, 0xee00}}, './file0\x00'}) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000000)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x1, "b18126", "b00a709996c9fbb5cc2b6032b7cd40b61cc9c81139105f2a87269a73dc00478e9843574b143393af44c5fb811d19fdd2cf9e2614adb99b00b540ea64f2be351d5de2d0a6223d136e9218abc0977e6a773d8bd16d17e279d79565fb61b1af300034967442124cf326f4dd8a775ed10921dda5fbecddde05be9519e99c32b5d7c9a6fc7a9a501a1bf0b765ef15e39b88ef854bb51b27c8e96911bf5d7907ad3112bee845238dbb584d76247520829ea7640494107c549bcef54863e870cd08018615ea0902433c7f81c6c64cf8c6787cb8e22b821ee4bcd81dc1dce1adbc06145e36bafe51d3e90873c26713924caa426155bd5175cd9ff739b91beba4f3a78575"}}, 0x110) openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f00000002c0)={0xc, 0x8, 0xfa00, {&(0x7f0000000140)}}, 0x10) (async) fsmount(0xffffffffffffffff, 0x0, 0xc) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) time(&(0x7f00000003c0)) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) (async) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r4) (async) io_cancel(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) (async) clock_gettime(0x0, &(0x7f00000005c0)) (async) io_getevents(0x0, 0x2, 0x5, &(0x7f0000000500)=[{}, {}, {}, {}, {}], &(0x7f0000000600)={r5, r6+60000000}) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000100)={0x0, 0x10, 0xfa00, {0x2, &(0x7f00000000c0), 0x2, 0x4}}, 0x20) (async) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r7}}, 0x10) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f00000004c0)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000400)=[{0x38, 0x0, [0x1ff, 0x4, 0x40, 0x2, 0x7, 0x9, 0x8, 0x6, 0x2, 0x0, 0xffff, 0xffff, 0x9, 0xf4, 0x3ff, 0x2]}, {0x8, 0x0, [0x0, 0x6, 0x9, 0x3, 0x0, 0x9, 0x52c, 0x8, 0x5, 0x94, 0x9, 0x4, 0x1, 0x1000, 0x5]}], r7, 0x1, 0x1, 0x90}}, 0x20) (async) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000340)={0xf, 0x8, 0xfa00, {r7, 0x1}}, 0x10) (async) openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) (async) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r8) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r8, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0xffffffffffffffff, 0xee00}}, './file0\x00'}) (async) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000000)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x1, "b18126", "b00a709996c9fbb5cc2b6032b7cd40b61cc9c81139105f2a87269a73dc00478e9843574b143393af44c5fb811d19fdd2cf9e2614adb99b00b540ea64f2be351d5de2d0a6223d136e9218abc0977e6a773d8bd16d17e279d79565fb61b1af300034967442124cf326f4dd8a775ed10921dda5fbecddde05be9519e99c32b5d7c9a6fc7a9a501a1bf0b765ef15e39b88ef854bb51b27c8e96911bf5d7907ad3112bee845238dbb584d76247520829ea7640494107c549bcef54863e870cd08018615ea0902433c7f81c6c64cf8c6787cb8e22b821ee4bcd81dc1dce1adbc06145e36bafe51d3e90873c26713924caa426155bd5175cd9ff739b91beba4f3a78575"}}, 0x110) (async) 14:44:30 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, 0x0, 0x0) 14:44:30 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x840, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0xee01, 0xffffffffffffffff}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, {0x0, 0xee00}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r2, {0x0, r3}}, './file0\x00'}) [ 3577.672005][ T3606] ? generic_write_checks+0x242/0x290 [ 3577.677590][ T3606] generic_file_write_iter+0x75/0x130 [ 3577.682979][ T3606] vfs_write+0x7f5/0x950 [ 3577.687232][ T3606] ksys_write+0xd9/0x190 [ 3577.691604][ T3606] __x64_sys_write+0x3e/0x50 [ 3577.696199][ T3606] do_syscall_64+0x44/0xd0 [ 3577.700619][ T3606] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3577.706599][ T3606] RIP: 0033:0x7f11f6e1c059 [ 3577.710992][ T3606] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 3577.730644][ T3606] RSP: 002b:00007f11f5f92168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3577.739057][ T3606] RAX: ffffffffffffffda RBX: 00007f11f6f2ef60 RCX: 00007f11f6e1c059 [ 3577.747023][ T3606] RDX: 0000000020000260 RSI: 0000000020000140 RDI: 0000000000000003 [ 3577.754972][ T3606] RBP: 00007f11f5f921d0 R08: 0000000000000000 R09: 0000000000000000 [ 3577.762996][ T3606] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 14:44:30 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r1) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32, @ANYRES32=r2, @ANYBLOB="2e2f6669a7c53000"]) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) io_setup(0x7f, &(0x7f0000000080)=0x0) io_cancel(r3, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) r4 = syz_io_uring_setup(0x5e5d, &(0x7f0000000500)={0x0, 0x5b77, 0x4, 0x0, 0x221}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000580), &(0x7f00000005c0)) r5 = syz_io_uring_setup(0x154a, &(0x7f0000000300)={0x0, 0x1006f6f, 0x20, 0x0, 0x2fb, 0x0, r4}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000000100), &(0x7f0000000380)) io_cancel(r3, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x2, 0x5, r5, &(0x7f00000003c0)="decfa1aebd5ce717ea328d7d52ca43c1648b828db6a55153097b358eff2bda116da8f918776ab8103ecb08055a673f86b2d96426749ade9353804f5e57c65172c778eaae0551cb871d595a30d7e9552cc9708b314ef38cf545e082d871c7b0bea14290e3d657e798374f282cc68daef7b9d5aa21f5316630a9fd80f63ccfe09a3dadae2e6ae5c5f80f8cec5a39164b603d6729ed20b686d9554658c7788a81f5f2b33f98aa9872f1427295c24fa3bf6d53a98fcf81278c", 0xb7, 0xe4c, 0x0, 0x0, r0}, &(0x7f00000004c0)) openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) (async) openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) (async) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r1) (async) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32, @ANYRES32=r2, @ANYBLOB="2e2f6669a7c53000"]) (async) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "13bd94e32c37a3932d8ad7271907f2903ccf3bb13b387d8fdf025cdf3c8faa37a970ea456fa2fd6f8354fc3b05088269a6d5b022e392b9bd78e5e2308e054c3e2cbb6e61b42c74f3c1ba8d63d10ed85dcc5d58071547cdfd9661f05024bcf8d7722e987a76fced66d3b33373d61da648b231fe3de6f7dc9a78420b7bf0a04efb660e06f2bf671a2060d09d80f7ee6ba3ae0b6edf87d14be34012ef95719e01f065ec7943a48dcce0fcf8f7f3a89c24d940f201c7c73a3c97872a80ca25d1a3114fe16f225f4f55f3c6456cab8f0aa59d8efdc6939eb7f2b223ceff25db5222ff8e86c024229beec9ce765151d6e706fd60ab8ffe4c2e736eec4bcae53c1aaaef"}}}, 0x120) (async) io_setup(0x7f, &(0x7f0000000080)) (async) io_cancel(r3, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) (async) syz_io_uring_setup(0x5e5d, &(0x7f0000000500)={0x0, 0x5b77, 0x4, 0x0, 0x221}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000580), &(0x7f00000005c0)) (async) syz_io_uring_setup(0x154a, &(0x7f0000000300)={0x0, 0x1006f6f, 0x20, 0x0, 0x2fb, 0x0, r4}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000000100), &(0x7f0000000380)) (async) io_cancel(r3, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x2, 0x5, r5, &(0x7f00000003c0)="decfa1aebd5ce717ea328d7d52ca43c1648b828db6a55153097b358eff2bda116da8f918776ab8103ecb08055a673f86b2d96426749ade9353804f5e57c65172c778eaae0551cb871d595a30d7e9552cc9708b314ef38cf545e082d871c7b0bea14290e3d657e798374f282cc68daef7b9d5aa21f5316630a9fd80f63ccfe09a3dadae2e6ae5c5f80f8cec5a39164b603d6729ed20b686d9554658c7788a81f5f2b33f98aa9872f1427295c24fa3bf6d53a98fcf81278c", 0xb7, 0xe4c, 0x0, 0x0, r0}, &(0x7f00000004c0)) (async) 14:44:30 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x840, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0xee01, 0xffffffffffffffff}}, './file0\x00'}) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, {0x0, 0xee00}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r2, {0x0, r3}}, './file0\x00'}) 14:44:30 executing program 3: write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000)=0x1, 0xffffffffffffffff, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(0xffffffffffffffff, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000100), 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "13bd94e32c37a3932d8ad7271907f2903ccf3bb13b387d8fdf025cdf3c8faa37a970ea456fa2fd6f8354fc3b05088269a6d5b022e392b9bd78e5e2308e054c3e2cbb6e61b42c74f3c1ba8d63d10ed85dcc5d58071547cdfd9661f05024bcf8d7722e987a76fced66d3b33373d61da648b231fe3de6f7dc9a78420b7bf0a04efb660e06f2bf671a2060d09d80f7ee6ba3ae0b6edf87d14be34012ef95719e01f065ec7943a48dcce0fcf8f7f3a89c24d940f201c7c73a3c97872a80ca25d1a3114fe16f225f4f55f3c6456cab8f0aa59d8efdc6939eb7f2b223ceff25db5222ff8e86c024229beec9ce765151d6e706fd60ab8ffe4c2e736eec4bcae53c1aaaef"}}}, 0x120) 14:44:30 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000300)={0x3, 0x40, 0xfa00, {{0xa, 0x4e20, 0xffff, @mcast1, 0x785089d7}, {0xa, 0x4e23, 0x39, @empty, 0x5}, 0xffffffffffffffff, 0x7f}}, 0x48) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r1) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x111}}, 0x20) (async, rerun: 64) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f, 0x6}}, 0x20) (rerun: 64) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000280)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000140)=[{0x19, 0x0, [0x10000, 0x2, 0x4, 0x1, 0x7, 0xc13, 0x8, 0x1, 0xfff, 0x200, 0x2, 0x5, 0x1000, 0x8, 0x1, 0x80000001]}, {0x4, 0x0, [0x7f, 0x8000, 0x6, 0x800, 0xff, 0x7, 0x7fffffff, 0xd7ca, 0xffffffff, 0x58, 0x4581, 0x9, 0x3, 0xdf, 0x9, 0x8]}, {0x24, 0x0, [0x9, 0x7fffffff, 0x0, 0x200, 0x9, 0x7ff, 0x7fff, 0x7, 0x30000, 0x4439, 0x0, 0x5, 0x68, 0x0, 0x8, 0x2]}], r2, 0x1, 0x1, 0xd8}}, 0x20) 14:44:30 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "13bd94e32c37a3932d8ad7271907f2903ccf3bb13b387d8fdf025cdf3c8faa37a970ea456fa2fd6f8354fc3b05088269a6d5b022e392b9bd78e5e2308e054c3e2cbb6e61b42c74f3c1ba8d63d10ed85dcc5d58071547cdfd9661f05024bcf8d7722e987a76fced66d3b33373d61da648b231fe3de6f7dc9a78420b7bf0a04efb660e06f2bf671a2060d09d80f7ee6ba3ae0b6edf87d14be34012ef95719e01f065ec7943a48dcce0fcf8f7f3a89c24d940f201c7c73a3c97872a80ca25d1a3114fe16f225f4f55f3c6456cab8f0aa59d8efdc6939eb7f2b223ceff25db5222ff8e86c024229beec9ce765151d6e706fd60ab8ffe4c2e736eec4bcae53c1aaaef"}}}, 0x20000260) (fail_nth: 1) 14:44:30 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x20000260) (fail_nth: 2) [ 3577.770956][ T3606] R13: 00007ffcf4c849ff R14: 00007f11f5f92300 R15: 0000000000022000 [ 3577.778959][ T3606] [ 3577.828071][ T3657] FAULT_INJECTION: forcing a failure. [ 3577.828071][ T3657] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3577.830640][ T3658] FAULT_INJECTION: forcing a failure. [ 3577.830640][ T3658] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3577.841396][ T3657] CPU: 0 PID: 3657 Comm: syz-executor.0 Not tainted 5.17.0-rc2-syzkaller-00167-gdcb85f85fa6f-dirty #0 [ 3577.865320][ T3657] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3577.875367][ T3657] Call Trace: [ 3577.878697][ T3657] [ 3577.881653][ T3657] dump_stack_lvl+0xd6/0x122 [ 3577.886243][ T3657] dump_stack+0x11/0x1b [ 3577.890450][ T3657] should_fail+0x23c/0x250 [ 3577.894853][ T3657] __alloc_pages+0x102/0x330 [ 3577.899464][ T3657] alloc_pages_vma+0x67e/0x810 [ 3577.904215][ T3657] ? percpu_counter_add_batch+0x109/0x130 [ 3577.910004][ T3657] shmem_getpage_gfp+0x8b4/0x12c0 [ 3577.915068][ T3657] ? do_user_addr_fault+0x7d4/0xb90 [ 3577.920259][ T3657] shmem_write_begin+0x7e/0x100 [ 3577.925103][ T3657] generic_perform_write+0x1c8/0x400 [ 3577.930369][ T3657] ? current_time+0xed/0x1a0 [ 3577.934947][ T3657] __generic_file_write_iter+0xf7/0x2b0 [ 3577.940475][ T3657] ? generic_write_checks+0x242/0x290 [ 3577.945833][ T3657] generic_file_write_iter+0x75/0x130 [ 3577.951214][ T3657] vfs_write+0x7f5/0x950 [ 3577.955443][ T3657] ksys_write+0xd9/0x190 [ 3577.959705][ T3657] __x64_sys_write+0x3e/0x50 [ 3577.964279][ T3657] do_syscall_64+0x44/0xd0 [ 3577.968748][ T3657] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3577.974691][ T3657] RIP: 0033:0x7f9e8db3d059 [ 3577.979120][ T3657] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 3577.998722][ T3657] RSP: 002b:00007f9e8ccb3168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3578.007188][ T3657] RAX: ffffffffffffffda RBX: 00007f9e8dc4ff60 RCX: 00007f9e8db3d059 [ 3578.015143][ T3657] RDX: 0000000020000260 RSI: 0000000020000140 RDI: 0000000000000003 [ 3578.023097][ T3657] RBP: 00007f9e8ccb31d0 R08: 0000000000000000 R09: 0000000000000000 [ 3578.031053][ T3657] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3578.039043][ T3657] R13: 00007ffe952cf46f R14: 00007f9e8ccb3300 R15: 0000000000022000 [ 3578.047088][ T3657] [ 3578.050091][ T3658] CPU: 1 PID: 3658 Comm: syz-executor.1 Not tainted 5.17.0-rc2-syzkaller-00167-gdcb85f85fa6f-dirty #0 [ 3578.061058][ T3658] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3578.071109][ T3658] Call Trace: [ 3578.074384][ T3658] 14:44:31 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x20000260) (fail_nth: 2) 14:44:31 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x840, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0xee01, 0xffffffffffffffff}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, {0x0, 0xee00}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r2, {0x0, r3}}, './file0\x00'}) openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) (async) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x840, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0xee01, 0xffffffffffffffff}}, './file0\x00'}) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, {0x0, 0xee00}}, './file0\x00'}) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r2, {0x0, r3}}, './file0\x00'}) (async) [ 3578.077312][ T3658] dump_stack_lvl+0xd6/0x122 [ 3578.081937][ T3658] dump_stack+0x11/0x1b [ 3578.086097][ T3658] should_fail+0x23c/0x250 [ 3578.089924][ T3675] FAULT_INJECTION: forcing a failure. [ 3578.089924][ T3675] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3578.090547][ T3658] should_fail_usercopy+0x16/0x20 [ 3578.090574][ T3658] copy_page_from_iter_atomic+0x2f1/0xcd0 [ 3578.114298][ T3658] ? shmem_write_begin+0x7e/0x100 [ 3578.119358][ T3658] generic_perform_write+0x211/0x400 [ 3578.124668][ T3658] ? current_time+0xed/0x1a0 [ 3578.129311][ T3658] __generic_file_write_iter+0xf7/0x2b0 [ 3578.134919][ T3658] ? generic_write_checks+0x242/0x290 [ 3578.140294][ T3658] generic_file_write_iter+0x75/0x130 [ 3578.145698][ T3658] vfs_write+0x7f5/0x950 [ 3578.149926][ T3658] ksys_write+0xd9/0x190 [ 3578.154246][ T3658] __x64_sys_write+0x3e/0x50 [ 3578.158898][ T3658] do_syscall_64+0x44/0xd0 [ 3578.163303][ T3658] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3578.169244][ T3658] RIP: 0033:0x7f11f6e1c059 [ 3578.173643][ T3658] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 3578.193233][ T3658] RSP: 002b:00007f11f5f92168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3578.201692][ T3658] RAX: ffffffffffffffda RBX: 00007f11f6f2ef60 RCX: 00007f11f6e1c059 [ 3578.209661][ T3658] RDX: 0000000020000260 RSI: 0000000020000140 RDI: 0000000000000003 [ 3578.217616][ T3658] RBP: 00007f11f5f921d0 R08: 0000000000000000 R09: 0000000000000000 [ 3578.225689][ T3658] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3578.233640][ T3658] R13: 00007ffcf4c849ff R14: 00007f11f5f92300 R15: 0000000000022000 [ 3578.241596][ T3658] [ 3578.244598][ T3675] CPU: 0 PID: 3675 Comm: syz-executor.0 Not tainted 5.17.0-rc2-syzkaller-00167-gdcb85f85fa6f-dirty #0 [ 3578.255536][ T3675] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3578.265591][ T3675] Call Trace: [ 3578.268863][ T3675] [ 3578.271786][ T3675] dump_stack_lvl+0xd6/0x122 [ 3578.276411][ T3675] dump_stack+0x11/0x1b [ 3578.280637][ T3675] should_fail+0x23c/0x250 [ 3578.285088][ T3675] should_fail_usercopy+0x16/0x20 [ 3578.290113][ T3675] copy_page_from_iter_atomic+0x2f1/0xcd0 [ 3578.295841][ T3675] ? shmem_write_begin+0x7e/0x100 [ 3578.300868][ T3675] generic_perform_write+0x211/0x400 [ 3578.306156][ T3675] ? current_time+0xed/0x1a0 [ 3578.310747][ T3675] __generic_file_write_iter+0xf7/0x2b0 [ 3578.316288][ T3675] ? generic_write_checks+0x242/0x290 [ 3578.321658][ T3675] generic_file_write_iter+0x75/0x130 [ 3578.327033][ T3675] vfs_write+0x7f5/0x950 [ 3578.331353][ T3675] ksys_write+0xd9/0x190 [ 3578.335650][ T3675] __x64_sys_write+0x3e/0x50 [ 3578.340236][ T3675] do_syscall_64+0x44/0xd0 [ 3578.344648][ T3675] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3578.350746][ T3675] RIP: 0033:0x7f9e8db3d059 [ 3578.355153][ T3675] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 3578.374863][ T3675] RSP: 002b:00007f9e8ccb3168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3578.383370][ T3675] RAX: ffffffffffffffda RBX: 00007f9e8dc4ff60 RCX: 00007f9e8db3d059 [ 3578.390432][ T3687] FAULT_INJECTION: forcing a failure. [ 3578.390432][ T3687] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3578.391386][ T3675] RDX: 0000000020000260 RSI: 0000000020000140 RDI: 0000000000000003 [ 3578.391403][ T3675] RBP: 00007f9e8ccb31d0 R08: 0000000000000000 R09: 0000000000000000 [ 3578.391415][ T3675] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 14:44:31 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "13bd94e32c37a3932d8ad7271907f2903ccf3bb13b387d8fdf025cdf3c8faa37a970ea456fa2fd6f8354fc3b05088269a6d5b022e392b9bd78e5e2308e054c3e2cbb6e61b42c74f3c1ba8d63d10ed85dcc5d58071547cdfd9661f05024bcf8d7722e987a76fced66d3b33373d61da648b231fe3de6f7dc9a78420b7bf0a04efb660e06f2bf671a2060d09d80f7ee6ba3ae0b6edf87d14be34012ef95719e01f065ec7943a48dcce0fcf8f7f3a89c24d940f201c7c73a3c97872a80ca25d1a3114fe16f225f4f55f3c6456cab8f0aa59d8efdc6939eb7f2b223ceff25db5222ff8e86c024229beec9ce765151d6e706fd60ab8ffe4c2e736eec4bcae53c1aaaef"}}}, 0x20000260) (fail_nth: 3) 14:44:31 executing program 3: write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000)=0x1, 0xffffffffffffffff, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(0xffffffffffffffff, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "e0b3772264c43c79ea3709d20d36cc4637f10fb5de2d44e0a73f520c3612063189eaba7b99fa9556bcac2ba1fb34035db66efe1e7ea748d786f601d0dcc0875cb8313c7db8b6c64b414bd5a06373bc3fbdf80ab140bf4b8f6c4a991196664cd95bbff1abeb0e982cc9b17aac4b0381a35d7a53d098e99e432a3b2f69c8b9abd7356e7cc0700ff8a36c56bf3e8a01564cd35c263749dc7c61c59645ecda836dc9f9771ff0fcdeec9e4d22cc1722bacd35e0096e747dac83ef85aed84e433e8b13e27f70ad877ff1a53934e230ed382a6c4ff7a6c1d3bb2cee4b336dcd368e29a06ed88efe1806f129bfbdfccf6c5e3ba935eb8ad0af3928b311e0a1c89eca9c75"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000100), 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) [ 3578.428605][ T3675] R13: 00007ffe952cf46f R14: 00007f9e8ccb3300 R15: 0000000000022000 [ 3578.436566][ T3675] [ 3578.439570][ T3687] CPU: 1 PID: 3687 Comm: syz-executor.1 Not tainted 5.17.0-rc2-syzkaller-00167-gdcb85f85fa6f-dirty #0 [ 3578.450550][ T3687] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3578.460701][ T3687] Call Trace: [ 3578.463980][ T3687] [ 3578.466907][ T3687] dump_stack_lvl+0xd6/0x122 [ 3578.471576][ T3687] dump_stack+0x11/0x1b [ 3578.475733][ T3687] should_fail+0x23c/0x250 [ 3578.480147][ T3687] __alloc_pages+0x102/0x330 [ 3578.484735][ T3687] alloc_pages_vma+0x67e/0x810 [ 3578.489543][ T3687] ? percpu_counter_add_batch+0x109/0x130 [ 3578.495272][ T3687] shmem_getpage_gfp+0x8b4/0x12c0 [ 3578.500460][ T3687] ? do_user_addr_fault+0x7d4/0xb90 [ 3578.505691][ T3687] shmem_write_begin+0x7e/0x100 [ 3578.510549][ T3687] generic_perform_write+0x1c8/0x400 [ 3578.516037][ T3687] ? shmem_write_begin+0x100/0x100 [ 3578.521189][ T3687] __generic_file_write_iter+0xf7/0x2b0 [ 3578.526769][ T3687] ? generic_write_checks+0x242/0x290 [ 3578.532140][ T3687] generic_file_write_iter+0x75/0x130 [ 3578.537549][ T3687] vfs_write+0x7f5/0x950 [ 3578.541816][ T3687] ksys_write+0xd9/0x190 [ 3578.546054][ T3687] __x64_sys_write+0x3e/0x50 [ 3578.550645][ T3687] do_syscall_64+0x44/0xd0 [ 3578.555061][ T3687] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3578.561092][ T3687] RIP: 0033:0x7f11f6e1c059 14:44:31 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) exit(0x3) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) 14:44:31 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000300)={0x3, 0x40, 0xfa00, {{0xa, 0x4e20, 0xffff, @mcast1, 0x785089d7}, {0xa, 0x4e23, 0x39, @empty, 0x5}, 0xffffffffffffffff, 0x7f}}, 0x48) (async) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r1) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x111}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000280)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000140)=[{0x19, 0x0, [0x10000, 0x2, 0x4, 0x1, 0x7, 0xc13, 0x8, 0x1, 0xfff, 0x200, 0x2, 0x5, 0x1000, 0x8, 0x1, 0x80000001]}, {0x4, 0x0, [0x7f, 0x8000, 0x6, 0x800, 0xff, 0x7, 0x7fffffff, 0xd7ca, 0xffffffff, 0x58, 0x4581, 0x9, 0x3, 0xdf, 0x9, 0x8]}, {0x24, 0x0, [0x9, 0x7fffffff, 0x0, 0x200, 0x9, 0x7ff, 0x7fff, 0x7, 0x30000, 0x4439, 0x0, 0x5, 0x68, 0x0, 0x8, 0x2]}], r2, 0x1, 0x1, 0xd8}}, 0x20) [ 3578.565538][ T3687] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 3578.585201][ T3687] RSP: 002b:00007f11f5f92168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3578.593650][ T3687] RAX: ffffffffffffffda RBX: 00007f11f6f2ef60 RCX: 00007f11f6e1c059 [ 3578.601718][ T3687] RDX: 0000000020000260 RSI: 0000000020000140 RDI: 0000000000000003 [ 3578.609736][ T3687] RBP: 00007f11f5f921d0 R08: 0000000000000000 R09: 0000000000000000 [ 3578.617696][ T3687] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3578.625781][ T3687] R13: 00007ffcf4c849ff R14: 00007f11f5f92300 R15: 0000000000022000 [ 3578.633926][ T3687] 14:44:31 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) (async) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r1) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32, @ANYRES32=r2, @ANYBLOB="2e2f6669a7c53000"]) (async) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) (async) io_setup(0x7f, &(0x7f0000000080)=0x0) io_cancel(r3, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) (async) r4 = syz_io_uring_setup(0x5e5d, &(0x7f0000000500)={0x0, 0x5b77, 0x4, 0x0, 0x221}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000580), &(0x7f00000005c0)) r5 = syz_io_uring_setup(0x154a, &(0x7f0000000300)={0x0, 0x1006f6f, 0x20, 0x0, 0x2fb, 0x0, r4}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000000100), &(0x7f0000000380)) io_cancel(r3, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x2, 0x5, r5, &(0x7f00000003c0)="decfa1aebd5ce717ea328d7d52ca43c1648b828db6a55153097b358eff2bda116da8f918776ab8103ecb08055a673f86b2d96426749ade9353804f5e57c65172c778eaae0551cb871d595a30d7e9552cc9708b314ef38cf545e082d871c7b0bea14290e3d657e798374f282cc68daef7b9d5aa21f5316630a9fd80f63ccfe09a3dadae2e6ae5c5f80f8cec5a39164b603d6729ed20b686d9554658c7788a81f5f2b33f98aa9872f1427295c24fa3bf6d53a98fcf81278c", 0xb7, 0xe4c, 0x0, 0x0, r0}, &(0x7f00000004c0)) 14:44:31 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, 0x0, 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000)=0x1, 0xffffffffffffffff, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000100), 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "13bd94e32c37a3932d8ad7271907f2903ccf3bb13b387d8fdf025cdf3c8faa37a970ea456fa2fd6f8354fc3b05088269a6d5b022e392b9bd78e5e2308e054c3e2cbb6e61b42c74f3c1ba8d63d10ed85dcc5d58071547cdfd9661f05024bcf8d7722e987a76fced66d3b33373d61da648b231fe3de6f7dc9a78420b7bf0a04efb660e06f2bf671a2060d09d80f7ee6ba3ae0b6edf87d14be34012ef95719e01f065ec7943a48dcce0fcf8f7f3a89c24d940f201c7c73a3c97872a80ca25d1a3114fe16f225f4f55f3c6456cab8f0aa59d8efdc6939eb7f2b223ceff25db5222ff8e86c024229beec9ce765151d6e706fd60ab8ffe4c2e736eec4bcae53c1aaaef"}}}, 0x120) 14:44:31 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x20000260) (fail_nth: 3) 14:44:31 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000280)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0, r1, 0x0, 0x3}}, 0x20) 14:44:31 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x20000260) (fail_nth: 4) [ 3578.705234][ T3700] FAULT_INJECTION: forcing a failure. [ 3578.705234][ T3700] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3578.707871][ T3706] FAULT_INJECTION: forcing a failure. [ 3578.707871][ T3706] name failslab, interval 1, probability 0, space 0, times 0 [ 3578.718570][ T3700] CPU: 0 PID: 3700 Comm: syz-executor.0 Not tainted 5.17.0-rc2-syzkaller-00167-gdcb85f85fa6f-dirty #0 [ 3578.742000][ T3700] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3578.752148][ T3700] Call Trace: [ 3578.755414][ T3700] [ 3578.758333][ T3700] dump_stack_lvl+0xd6/0x122 [ 3578.762915][ T3700] dump_stack+0x11/0x1b [ 3578.767108][ T3700] should_fail+0x23c/0x250 [ 3578.771533][ T3700] __alloc_pages+0x102/0x330 [ 3578.776114][ T3700] alloc_pages_vma+0x67e/0x810 [ 3578.780868][ T3700] ? percpu_counter_add_batch+0x109/0x130 [ 3578.786613][ T3700] shmem_getpage_gfp+0x8b4/0x12c0 [ 3578.791630][ T3700] ? do_user_addr_fault+0x7d4/0xb90 [ 3578.796887][ T3700] shmem_write_begin+0x7e/0x100 [ 3578.801736][ T3700] generic_perform_write+0x1c8/0x400 [ 3578.807024][ T3700] ? shmem_write_begin+0x100/0x100 [ 3578.812124][ T3700] __generic_file_write_iter+0xf7/0x2b0 [ 3578.817656][ T3700] ? generic_write_checks+0x242/0x290 [ 3578.823019][ T3700] generic_file_write_iter+0x75/0x130 [ 3578.828564][ T3700] vfs_write+0x7f5/0x950 [ 3578.832796][ T3700] ksys_write+0xd9/0x190 [ 3578.837114][ T3700] __x64_sys_write+0x3e/0x50 [ 3578.841747][ T3700] do_syscall_64+0x44/0xd0 [ 3578.846211][ T3700] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3578.852129][ T3700] RIP: 0033:0x7f9e8db3d059 [ 3578.856533][ T3700] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 3578.876246][ T3700] RSP: 002b:00007f9e8ccb3168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3578.884649][ T3700] RAX: ffffffffffffffda RBX: 00007f9e8dc4ff60 RCX: 00007f9e8db3d059 [ 3578.892609][ T3700] RDX: 0000000020000260 RSI: 0000000020000140 RDI: 0000000000000003 14:44:32 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, 0x0, 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000)=0x1, 0xffffffffffffffff, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000100), 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) 14:44:32 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x20000260) (fail_nth: 4) [ 3578.900566][ T3700] RBP: 00007f9e8ccb31d0 R08: 0000000000000000 R09: 0000000000000000 [ 3578.908581][ T3700] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3578.916535][ T3700] R13: 00007ffe952cf46f R14: 00007f9e8ccb3300 R15: 0000000000022000 [ 3578.924582][ T3700] [ 3578.927634][ T3706] CPU: 1 PID: 3706 Comm: syz-executor.1 Not tainted 5.17.0-rc2-syzkaller-00167-gdcb85f85fa6f-dirty #0 [ 3578.938627][ T3706] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3578.948703][ T3706] Call Trace: [ 3578.951981][ T3706] [ 3578.954951][ T3706] dump_stack_lvl+0xd6/0x122 [ 3578.955159][ T3711] FAULT_INJECTION: forcing a failure. [ 3578.955159][ T3711] name failslab, interval 1, probability 0, space 0, times 0 [ 3578.959628][ T3706] dump_stack+0x11/0x1b [ 3578.976325][ T3706] should_fail+0x23c/0x250 [ 3578.980735][ T3706] ? xas_create+0x3fb/0xb10 [ 3578.985294][ T3706] __should_failslab+0x81/0x90 [ 3578.990106][ T3706] should_failslab+0x5/0x20 [ 3578.994599][ T3706] kmem_cache_alloc+0x4f/0x320 [ 3578.999355][ T3706] xas_create+0x3fb/0xb10 [ 3579.003810][ T3706] xas_store+0x70/0xca0 [ 3579.007946][ T3706] ? xas_find_conflict+0x422/0x4c0 [ 3579.013041][ T3706] shmem_add_to_page_cache+0x441/0x590 [ 3579.018493][ T3706] shmem_getpage_gfp+0xae9/0x12c0 [ 3579.023607][ T3706] shmem_write_begin+0x7e/0x100 [ 3579.028510][ T3706] generic_perform_write+0x1c8/0x400 [ 3579.033784][ T3706] ? shmem_write_begin+0x100/0x100 [ 3579.038885][ T3706] __generic_file_write_iter+0xf7/0x2b0 [ 3579.044436][ T3706] ? generic_write_checks+0x242/0x290 [ 3579.049869][ T3706] generic_file_write_iter+0x75/0x130 [ 3579.055294][ T3706] vfs_write+0x7f5/0x950 [ 3579.059528][ T3706] ksys_write+0xd9/0x190 [ 3579.063784][ T3706] __x64_sys_write+0x3e/0x50 [ 3579.068357][ T3706] do_syscall_64+0x44/0xd0 [ 3579.072774][ T3706] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3579.078733][ T3706] RIP: 0033:0x7f11f6e1c059 [ 3579.083206][ T3706] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 3579.102852][ T3706] RSP: 002b:00007f11f5f92168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3579.111248][ T3706] RAX: ffffffffffffffda RBX: 00007f11f6f2ef60 RCX: 00007f11f6e1c059 [ 3579.119216][ T3706] RDX: 0000000020000260 RSI: 0000000020000140 RDI: 0000000000000003 [ 3579.127172][ T3706] RBP: 00007f11f5f921d0 R08: 0000000000000000 R09: 0000000000000000 [ 3579.135158][ T3706] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3579.143125][ T3706] R13: 00007ffcf4c849ff R14: 00007f11f5f92300 R15: 0000000000022000 [ 3579.151082][ T3706] [ 3579.154156][ T3711] CPU: 0 PID: 3711 Comm: syz-executor.0 Not tainted 5.17.0-rc2-syzkaller-00167-gdcb85f85fa6f-dirty #0 [ 3579.165096][ T3711] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3579.175198][ T3711] Call Trace: [ 3579.178473][ T3711] [ 3579.181402][ T3711] dump_stack_lvl+0xd6/0x122 [ 3579.185996][ T3711] dump_stack+0x11/0x1b [ 3579.190171][ T3711] should_fail+0x23c/0x250 [ 3579.194583][ T3711] ? xas_create+0x3fb/0xb10 [ 3579.199096][ T3711] __should_failslab+0x81/0x90 [ 3579.203896][ T3711] should_failslab+0x5/0x20 [ 3579.208405][ T3711] kmem_cache_alloc+0x4f/0x320 [ 3579.213170][ T3711] xas_create+0x3fb/0xb10 [ 3579.217577][ T3711] xas_store+0x70/0xca0 [ 3579.221733][ T3711] ? xas_find_conflict+0x422/0x4c0 [ 3579.226842][ T3711] shmem_add_to_page_cache+0x441/0x590 [ 3579.232341][ T3711] shmem_getpage_gfp+0xae9/0x12c0 [ 3579.237373][ T3711] shmem_write_begin+0x7e/0x100 [ 3579.242270][ T3711] generic_perform_write+0x1c8/0x400 [ 3579.247563][ T3711] ? shmem_write_begin+0x100/0x100 [ 3579.252681][ T3711] __generic_file_write_iter+0xf7/0x2b0 [ 3579.258229][ T3711] ? generic_write_checks+0x242/0x290 [ 3579.263782][ T3711] generic_file_write_iter+0x75/0x130 [ 3579.269244][ T3711] vfs_write+0x7f5/0x950 [ 3579.273492][ T3711] ksys_write+0xd9/0x190 [ 3579.277736][ T3711] __x64_sys_write+0x3e/0x50 [ 3579.282319][ T3711] do_syscall_64+0x44/0xd0 [ 3579.286739][ T3711] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3579.292751][ T3711] RIP: 0033:0x7f9e8db3d059 [ 3579.297160][ T3711] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 3579.299910][ T3715] FAULT_INJECTION: forcing a failure. [ 3579.299910][ T3715] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3579.316767][ T3711] RSP: 002b:00007f9e8ccb3168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3579.316791][ T3711] RAX: ffffffffffffffda RBX: 00007f9e8dc4ff60 RCX: 00007f9e8db3d059 [ 3579.316803][ T3711] RDX: 0000000020000260 RSI: 0000000020000140 RDI: 0000000000000003 14:44:32 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x20000260) (fail_nth: 5) [ 3579.354118][ T3711] RBP: 00007f9e8ccb31d0 R08: 0000000000000000 R09: 0000000000000000 [ 3579.362091][ T3711] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3579.370085][ T3711] R13: 00007ffe952cf46f R14: 00007f9e8ccb3300 R15: 0000000000022000 [ 3579.378050][ T3711] [ 3579.381056][ T3715] CPU: 1 PID: 3715 Comm: syz-executor.1 Not tainted 5.17.0-rc2-syzkaller-00167-gdcb85f85fa6f-dirty #0 [ 3579.392048][ T3715] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3579.402204][ T3715] Call Trace: [ 3579.405486][ T3715] [ 3579.408407][ T3715] dump_stack_lvl+0xd6/0x122 [ 3579.413029][ T3715] dump_stack+0x11/0x1b [ 3579.417197][ T3715] should_fail+0x23c/0x250 [ 3579.421637][ T3715] should_fail_usercopy+0x16/0x20 [ 3579.426663][ T3715] copy_page_from_iter_atomic+0x2f1/0xcd0 [ 3579.432387][ T3715] ? shmem_write_begin+0x7e/0x100 [ 3579.437505][ T3715] generic_perform_write+0x211/0x400 [ 3579.442941][ T3715] ? shmem_write_begin+0x100/0x100 [ 3579.448054][ T3715] __generic_file_write_iter+0xf7/0x2b0 [ 3579.453605][ T3715] ? generic_write_checks+0x242/0x290 14:44:32 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, 0x0, 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000)=0x1, 0xffffffffffffffff, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000100), 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) 14:44:32 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000280)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0, r1, 0x0, 0x3}}, 0x20) [ 3579.458976][ T3715] generic_file_write_iter+0x75/0x130 [ 3579.464486][ T3715] vfs_write+0x7f5/0x950 [ 3579.468731][ T3715] ksys_write+0xd9/0x190 [ 3579.473050][ T3715] __x64_sys_write+0x3e/0x50 [ 3579.477660][ T3715] do_syscall_64+0x44/0xd0 [ 3579.482084][ T3715] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3579.488056][ T3715] RIP: 0033:0x7f11f6e1c059 14:44:32 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) (async) exit(0x3) (async) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) 14:44:32 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x20000260) (fail_nth: 5) [ 3579.492468][ T3715] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 3579.512195][ T3715] RSP: 002b:00007f11f5f92168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3579.520619][ T3715] RAX: ffffffffffffffda RBX: 00007f11f6f2ef60 RCX: 00007f11f6e1c059 [ 3579.528650][ T3715] RDX: 0000000020000260 RSI: 0000000020000140 RDI: 0000000000000003 [ 3579.536669][ T3715] RBP: 00007f11f5f921d0 R08: 0000000000000000 R09: 0000000000000000 [ 3579.539696][ T3723] FAULT_INJECTION: forcing a failure. [ 3579.539696][ T3723] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3579.544738][ T3715] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3579.544765][ T3715] R13: 00007ffcf4c849ff R14: 00007f11f5f92300 R15: 0000000000022000 [ 3579.544781][ T3715] [ 3579.576831][ T3723] CPU: 0 PID: 3723 Comm: syz-executor.0 Not tainted 5.17.0-rc2-syzkaller-00167-gdcb85f85fa6f-dirty #0 [ 3579.587807][ T3723] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3579.597858][ T3723] Call Trace: [ 3579.601128][ T3723] [ 3579.604071][ T3723] dump_stack_lvl+0xd6/0x122 [ 3579.608670][ T3723] dump_stack+0x11/0x1b [ 3579.612841][ T3723] should_fail+0x23c/0x250 [ 3579.617264][ T3723] should_fail_usercopy+0x16/0x20 [ 3579.622289][ T3723] copy_page_from_iter_atomic+0x2f1/0xcd0 [ 3579.628012][ T3723] ? shmem_write_begin+0x7e/0x100 [ 3579.633127][ T3723] generic_perform_write+0x211/0x400 [ 3579.638413][ T3723] ? shmem_write_begin+0x100/0x100 [ 3579.643561][ T3723] __generic_file_write_iter+0xf7/0x2b0 [ 3579.649167][ T3723] ? generic_write_checks+0x242/0x290 [ 3579.654631][ T3723] generic_file_write_iter+0x75/0x130 [ 3579.660012][ T3723] vfs_write+0x7f5/0x950 [ 3579.664259][ T3723] ksys_write+0xd9/0x190 [ 3579.668517][ T3723] __x64_sys_write+0x3e/0x50 [ 3579.673113][ T3723] do_syscall_64+0x44/0xd0 [ 3579.677578][ T3723] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3579.683562][ T3723] RIP: 0033:0x7f9e8db3d059 [ 3579.687983][ T3723] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 3579.707696][ T3723] RSP: 002b:00007f9e8ccb3168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3579.716090][ T3723] RAX: ffffffffffffffda RBX: 00007f9e8dc4ff60 RCX: 00007f9e8db3d059 [ 3579.724041][ T3723] RDX: 0000000020000260 RSI: 0000000020000140 RDI: 0000000000000003 [ 3579.732004][ T3723] RBP: 00007f9e8ccb31d0 R08: 0000000000000000 R09: 0000000000000000 [ 3579.739961][ T3723] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3579.747922][ T3723] R13: 00007ffe952cf46f R14: 00007f9e8ccb3300 R15: 0000000000022000 [ 3579.755890][ T3723] 14:44:32 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x472981, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000003c0)={0x9, 0xb1, 0xfa00, {0xffffffffffffffff, 0x0, "1d040c", "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"}}, 0xfffffffffffffedd) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x2, 0x13, r2, 0x0) 14:44:32 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000280)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0, r1, 0x0, 0x3}}, 0x20) 14:44:32 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000)=0x1, 0xffffffffffffffff, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000100), 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) 14:44:32 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x20000260) (fail_nth: 6) 14:44:32 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000)=0x1, 0xffffffffffffffff, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000100), 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) 14:44:32 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x472981, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000003c0)={0x9, 0xb1, 0xfa00, {0xffffffffffffffff, 0x0, "1d040c", "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"}}, 0xfffffffffffffedd) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "13bd94e32c37a3932d8ad7271907f2903ccf3bb13b387d8fdf025cdf3c8faa37a970ea456fa2fd6f8354fc3b05088269a6d5b022e392b9bd78e5e2308e054c3e2cbb6e61b42c74f3c1ba8d63d10ed85dcc5d58071547cdfd9661f05024bcf8d7722e987a76fced66d3b33373d61da648b231fe3de6f7dc9a78420b7bf0a04efb660e06f2bf671a2060d09d80f7ee6ba3ae0b6edf87d14be34012ef95719e01f065ec7943a48dcce0fcf8f7f3a89c24d940f201c7c73a3c97872a80ca25d1a3114fe16f225f4f55f3c6456cab8f0aa59d8efdc6939eb7f2b223ceff25db5222ff8e86c024229beec9ce765151d6e706fd60ab8ffe4c2e736eec4bcae53c1aaaef"}}}, 0x120) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x2, 0x13, r2, 0x0) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x472981, 0x0) (async) openat$bsg(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000003c0)={0x9, 0xb1, 0xfa00, {0xffffffffffffffff, 0x0, "1d040c", "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"}}, 0xfffffffffffffedd) (async) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) (async) openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) (async) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r2) (async) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x2, 0x13, r2, 0x0) (async) 14:44:32 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000)=0x1, 0xffffffffffffffff, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000100), 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) 14:44:32 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000)=0x1, 0xffffffffffffffff, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "e0b3772264c43c79ea3709d20d36cc4637f10fb5de2d44e0a73f520c3612063189eaba7b99fa9556bcac2ba1fb34035db66efe1e7ea748d786f601d0dcc0875cb8313c7db8b6c64b414bd5a06373bc3fbdf80ab140bf4b8f6c4a991196664cd95bbff1abeb0e982cc9b17aac4b0381a35d7a53d098e99e432a3b2f69c8b9abd7356e7cc0700ff8a36c56bf3e8a01564cd35c263749dc7c61c59645ecda836dc9f9771ff0fcdeec9e4d22cc1722bacd35e0096e747dac83ef85aed84e433e8b13e27f70ad877ff1a53934e230ed382a6c4ff7a6c1d3bb2cee4b336dcd368e29a06ed88efe1806f129bfbdfccf6c5e3ba935eb8ad0af3928b311e0a1c89eca9c75"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000100), 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) [ 3579.803213][ T3732] FAULT_INJECTION: forcing a failure. [ 3579.803213][ T3732] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3579.816481][ T3732] CPU: 0 PID: 3732 Comm: syz-executor.1 Not tainted 5.17.0-rc2-syzkaller-00167-gdcb85f85fa6f-dirty #0 [ 3579.827735][ T3732] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3579.837795][ T3732] Call Trace: [ 3579.841078][ T3732] [ 3579.844016][ T3732] dump_stack_lvl+0xd6/0x122 [ 3579.848618][ T3732] dump_stack+0x11/0x1b 14:44:33 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000280)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0, r1, 0x0, 0x3}}, 0x20) [ 3579.852844][ T3732] should_fail+0x23c/0x250 [ 3579.857402][ T3732] __alloc_pages+0x102/0x330 [ 3579.861998][ T3732] alloc_pages_vma+0x67e/0x810 [ 3579.866773][ T3732] ? percpu_counter_add_batch+0x109/0x130 [ 3579.872676][ T3732] shmem_getpage_gfp+0x8b4/0x12c0 [ 3579.877869][ T3732] ? do_user_addr_fault+0x7d4/0xb90 [ 3579.883091][ T3732] shmem_write_begin+0x7e/0x100 [ 3579.887957][ T3732] generic_perform_write+0x1c8/0x400 [ 3579.893271][ T3732] ? shmem_write_begin+0x100/0x100 [ 3579.898394][ T3732] __generic_file_write_iter+0xf7/0x2b0 [ 3579.904003][ T3732] ? generic_write_checks+0x242/0x290 [ 3579.909525][ T3732] generic_file_write_iter+0x75/0x130 [ 3579.914961][ T3732] vfs_write+0x7f5/0x950 [ 3579.919234][ T3732] ksys_write+0xd9/0x190 [ 3579.923480][ T3732] __x64_sys_write+0x3e/0x50 [ 3579.928081][ T3732] do_syscall_64+0x44/0xd0 [ 3579.932506][ T3732] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3579.938414][ T3732] RIP: 0033:0x7f11f6e1c059 14:44:33 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x20000260) (fail_nth: 6) [ 3579.942836][ T3732] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 3579.962480][ T3732] RSP: 002b:00007f11f5f92168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3579.970924][ T3732] RAX: ffffffffffffffda RBX: 00007f11f6f2ef60 RCX: 00007f11f6e1c059 [ 3579.972433][ T3753] FAULT_INJECTION: forcing a failure. [ 3579.972433][ T3753] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3579.978920][ T3732] RDX: 0000000020000260 RSI: 0000000020000140 RDI: 0000000000000003 [ 3579.978937][ T3732] RBP: 00007f11f5f921d0 R08: 0000000000000000 R09: 0000000000000000 [ 3579.978949][ T3732] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3579.978961][ T3732] R13: 00007ffcf4c849ff R14: 00007f11f5f92300 R15: 0000000000022000 [ 3580.024031][ T3732] [ 3580.027040][ T3753] CPU: 1 PID: 3753 Comm: syz-executor.0 Not tainted 5.17.0-rc2-syzkaller-00167-gdcb85f85fa6f-dirty #0 [ 3580.038017][ T3753] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3580.048078][ T3753] Call Trace: [ 3580.051377][ T3753] [ 3580.054312][ T3753] dump_stack_lvl+0xd6/0x122 [ 3580.058918][ T3753] dump_stack+0x11/0x1b [ 3580.063141][ T3753] should_fail+0x23c/0x250 [ 3580.067594][ T3753] __alloc_pages+0x102/0x330 [ 3580.072218][ T3753] alloc_pages_vma+0x67e/0x810 [ 3580.076973][ T3753] ? percpu_counter_add_batch+0x109/0x130 [ 3580.082698][ T3753] shmem_getpage_gfp+0x8b4/0x12c0 [ 3580.087793][ T3753] ? do_user_addr_fault+0x7d4/0xb90 [ 3580.092986][ T3753] shmem_write_begin+0x7e/0x100 [ 3580.097954][ T3753] generic_perform_write+0x1c8/0x400 [ 3580.103259][ T3753] ? shmem_write_begin+0x100/0x100 [ 3580.108533][ T3753] __generic_file_write_iter+0xf7/0x2b0 [ 3580.114186][ T3753] ? generic_write_checks+0x242/0x290 [ 3580.119551][ T3753] generic_file_write_iter+0x75/0x130 [ 3580.124912][ T3753] vfs_write+0x7f5/0x950 [ 3580.129164][ T3753] ksys_write+0xd9/0x190 [ 3580.133393][ T3753] __x64_sys_write+0x3e/0x50 [ 3580.138000][ T3753] do_syscall_64+0x44/0xd0 [ 3580.142429][ T3753] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3580.148337][ T3753] RIP: 0033:0x7f9e8db3d059 [ 3580.152785][ T3753] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 3580.172378][ T3753] RSP: 002b:00007f9e8ccb3168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3580.180825][ T3753] RAX: ffffffffffffffda RBX: 00007f9e8dc4ff60 RCX: 00007f9e8db3d059 [ 3580.188799][ T3753] RDX: 0000000020000260 RSI: 0000000020000140 RDI: 0000000000000003 [ 3580.196754][ T3753] RBP: 00007f9e8ccb31d0 R08: 0000000000000000 R09: 0000000000000000 [ 3580.204967][ T3753] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3580.214993][ T3753] R13: 00007ffe952cf46f R14: 00007f9e8ccb3300 R15: 0000000000022000 [ 3580.222988][ T3753] 14:44:33 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) (async) exit(0x3) (async) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) 14:44:33 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000)=0x1, 0xffffffffffffffff, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "e0b3772264c43c79ea3709d20d36cc4637f10fb5de2d44e0a73f520c3612063189eaba7b99fa9556bcac2ba1fb34035db66efe1e7ea748d786f601d0dcc0875cb8313c7db8b6c64b414bd5a06373bc3fbdf80ab140bf4b8f6c4a991196664cd95bbff1abeb0e982cc9b17aac4b0381a35d7a53d098e99e432a3b2f69c8b9abd7356e7cc0700ff8a36c56bf3e8a01564cd35c263749dc7c61c59645ecda836dc9f9771ff0fcdeec9e4d22cc1722bacd35e0096e747dac83ef85aed84e433e8b13e27f70ad877ff1a53934e230ed382a6c4ff7a6c1d3bb2cee4b336dcd368e29a06ed88efe1806f129bfbdfccf6c5e3ba935eb8ad0af3928b311e0a1c89eca9c75"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000100), 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) 14:44:33 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x20000260) (fail_nth: 7) 14:44:33 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000280)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0, r1, 0x0, 0x3}}, 0x20) 14:44:33 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x472981, 0x0) (async) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000003c0)={0x9, 0xb1, 0xfa00, {0xffffffffffffffff, 0x0, "1d040c", "e0b3772264c43c79ea3709d20d36cc4637f10fb5de2d44e0a73f520c3612063189eaba7b99fa9556bcac2ba1fb34035db66efe1e7ea748d786f601d0dcc0875cb8313c7db8b6c64b414bd5a06373bc3fbdf80ab140bf4b8f6c4a991196664cd95bbff1abeb0e982cc9b17aac4b0381a35d7a53d098e99e432a3b2f69c8b9abd7356e7cc0700ff8a36c56bf3e8a01564cd35c263749dc7c61c59645ecda836dc9f9771ff0fcdeec9e4d22cc1722bacd35e0096e747dac83ef85aed84e433e8b13e27f70ad877ff1a53934e230ed382a6c4ff7a6c1d3bb2cee4b336dcd368e29a06ed88efe1806f129bfbdfccf6c5e3ba935eb8ad0af3928b311e0a1c89eca9c75"}}, 0xfffffffffffffedd) (async) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) (async) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r2) (async, rerun: 32) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x2, 0x13, r2, 0x0) (rerun: 32) 14:44:33 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x20000260) (fail_nth: 7) [ 3580.394251][ T3759] FAULT_INJECTION: forcing a failure. [ 3580.394251][ T3759] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3580.400721][ T3764] FAULT_INJECTION: forcing a failure. [ 3580.400721][ T3764] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3580.407356][ T3759] CPU: 1 PID: 3759 Comm: syz-executor.1 Not tainted 5.17.0-rc2-syzkaller-00167-gdcb85f85fa6f-dirty #0 [ 3580.407381][ T3759] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3580.407393][ T3759] Call Trace: [ 3580.407399][ T3759] [ 3580.407406][ T3759] dump_stack_lvl+0xd6/0x122 [ 3580.452091][ T3759] dump_stack+0x11/0x1b [ 3580.456298][ T3759] should_fail+0x23c/0x250 [ 3580.460705][ T3759] should_fail_usercopy+0x16/0x20 [ 3580.465734][ T3759] copy_page_from_iter_atomic+0x2f1/0xcd0 [ 3580.471530][ T3759] ? shmem_write_begin+0x7e/0x100 [ 3580.476603][ T3759] generic_perform_write+0x211/0x400 [ 3580.481877][ T3759] ? shmem_write_begin+0x100/0x100 [ 3580.486995][ T3759] __generic_file_write_iter+0xf7/0x2b0 [ 3580.492536][ T3759] ? generic_write_checks+0x242/0x290 [ 3580.497900][ T3759] generic_file_write_iter+0x75/0x130 [ 3580.503259][ T3759] vfs_write+0x7f5/0x950 [ 3580.507495][ T3759] ksys_write+0xd9/0x190 [ 3580.511873][ T3759] __x64_sys_write+0x3e/0x50 [ 3580.516494][ T3759] do_syscall_64+0x44/0xd0 [ 3580.520911][ T3759] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3580.526845][ T3759] RIP: 0033:0x7f11f6e1c059 [ 3580.531254][ T3759] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 3580.550847][ T3759] RSP: 002b:00007f11f5f92168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3580.559255][ T3759] RAX: ffffffffffffffda RBX: 00007f11f6f2ef60 RCX: 00007f11f6e1c059 [ 3580.567229][ T3759] RDX: 0000000020000260 RSI: 0000000020000140 RDI: 0000000000000003 [ 3580.575205][ T3759] RBP: 00007f11f5f921d0 R08: 0000000000000000 R09: 0000000000000000 [ 3580.583162][ T3759] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3580.591119][ T3759] R13: 00007ffcf4c849ff R14: 00007f11f5f92300 R15: 0000000000022000 [ 3580.599154][ T3759] [ 3580.602163][ T3764] CPU: 0 PID: 3764 Comm: syz-executor.0 Not tainted 5.17.0-rc2-syzkaller-00167-gdcb85f85fa6f-dirty #0 [ 3580.613374][ T3764] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3580.623436][ T3764] Call Trace: [ 3580.626800][ T3764] [ 3580.629725][ T3764] dump_stack_lvl+0xd6/0x122 [ 3580.634340][ T3764] dump_stack+0x11/0x1b [ 3580.638514][ T3764] should_fail+0x23c/0x250 [ 3580.642996][ T3764] should_fail_usercopy+0x16/0x20 [ 3580.648034][ T3764] copy_page_from_iter_atomic+0x2f1/0xcd0 [ 3580.653806][ T3764] ? shmem_write_begin+0x7e/0x100 [ 3580.658922][ T3764] generic_perform_write+0x211/0x400 [ 3580.664208][ T3764] ? shmem_write_begin+0x100/0x100 [ 3580.669328][ T3764] __generic_file_write_iter+0xf7/0x2b0 [ 3580.674875][ T3764] ? generic_write_checks+0x242/0x290 [ 3580.680281][ T3764] generic_file_write_iter+0x75/0x130 [ 3580.685658][ T3764] vfs_write+0x7f5/0x950 [ 3580.690001][ T3764] ksys_write+0xd9/0x190 14:44:33 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000280)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0, r1, 0x0, 0x3}}, 0x20) 14:44:33 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000)=0x1, 0xffffffffffffffff, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000100), 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) 14:44:33 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) socket$inet_sctp(0x2, 0x0, 0x84) r1 = socket(0x10, 0x804, 0x3) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000280)={0x200}, 0x4) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="0c010000", @ANYRES16=r2, @ANYBLOB="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"], 0x10c}, 0x1, 0x0, 0x0, 0x4000840}, 0x4008000) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "e0b3772264c43c79ea3709d20d36cc4637f10fb5de2d44e0a73f520c3612063189eaba7b99fa9556bcac2ba1fb34035db66efe1e7ea748d786f601d0dcc0875cb8313c7db8b6c64b414bd5a06373bc3fbdf80ab140bf4b8f6c4a991196664cd95bbff1abeb0e982cc9b17aac4b0381a35d7a53d098e99e432a3b2f69c8b9abd7356e7cc0700ff8a36c56bf3e8a01564cd35c263749dc7c61c59645ecda836dc9f9771ff0fcdeec9e4d22cc1722bacd35e0096e747dac83ef85aed84e433e8b13e27f70ad877ff1a53934e230ed382a6c4ff7a6c1d3bb2cee4b336dcd368e29a06ed88efe1806f129bfbdfccf6c5e3ba935eb8ad0af3928b311e0a1c89eca9c75"}}, 0x110) r3 = socket$inet(0x2, 0xa, 0x1) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r3, 0x84, 0xc, &(0x7f0000000000), 0x4) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) [ 3580.694266][ T3764] __x64_sys_write+0x3e/0x50 [ 3580.698861][ T3764] do_syscall_64+0x44/0xd0 [ 3580.703374][ T3764] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3580.709280][ T3764] RIP: 0033:0x7f9e8db3d059 [ 3580.713693][ T3764] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 3580.733305][ T3764] RSP: 002b:00007f9e8ccb3168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 14:44:33 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x20000260) (fail_nth: 8) [ 3580.741722][ T3764] RAX: ffffffffffffffda RBX: 00007f9e8dc4ff60 RCX: 00007f9e8db3d059 [ 3580.749711][ T3764] RDX: 0000000020000260 RSI: 0000000020000140 RDI: 0000000000000003 [ 3580.757685][ T3764] RBP: 00007f9e8ccb31d0 R08: 0000000000000000 R09: 0000000000000000 [ 3580.765659][ T3764] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3580.773779][ T3764] R13: 00007ffe952cf46f R14: 00007f9e8ccb3300 R15: 0000000000022000 [ 3580.781765][ T3764] [ 3580.785413][ T3777] FAULT_INJECTION: forcing a failure. [ 3580.785413][ T3777] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3580.798670][ T3777] CPU: 1 PID: 3777 Comm: syz-executor.1 Not tainted 5.17.0-rc2-syzkaller-00167-gdcb85f85fa6f-dirty #0 [ 3580.809618][ T3777] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3580.819818][ T3777] Call Trace: [ 3580.823092][ T3777] [ 3580.826054][ T3777] dump_stack_lvl+0xd6/0x122 [ 3580.830689][ T3777] dump_stack+0x11/0x1b [ 3580.834953][ T3777] should_fail+0x23c/0x250 [ 3580.839370][ T3777] __alloc_pages+0x102/0x330 [ 3580.843974][ T3777] alloc_pages_vma+0x67e/0x810 [ 3580.848775][ T3777] ? percpu_counter_add_batch+0x109/0x130 [ 3580.854508][ T3777] shmem_getpage_gfp+0x8b4/0x12c0 [ 3580.859543][ T3777] ? do_user_addr_fault+0x7d4/0xb90 [ 3580.864835][ T3777] shmem_write_begin+0x7e/0x100 [ 3580.869735][ T3777] generic_perform_write+0x1c8/0x400 [ 3580.875026][ T3777] ? shmem_write_begin+0x100/0x100 [ 3580.880332][ T3777] __generic_file_write_iter+0xf7/0x2b0 [ 3580.885885][ T3777] ? generic_write_checks+0x242/0x290 [ 3580.891275][ T3777] generic_file_write_iter+0x75/0x130 [ 3580.896661][ T3777] vfs_write+0x7f5/0x950 [ 3580.900914][ T3777] ksys_write+0xd9/0x190 [ 3580.905220][ T3777] __x64_sys_write+0x3e/0x50 [ 3580.909808][ T3777] do_syscall_64+0x44/0xd0 [ 3580.914286][ T3777] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3580.920223][ T3777] RIP: 0033:0x7f11f6e1c059 [ 3580.924633][ T3777] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 14:44:34 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) socket$inet_udplite(0x2, 0x2, 0x88) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r2) write$selinux_attr(r2, &(0x7f0000000000)='system_u:object_r:tmpreaper_exec_t:s0\x00', 0x26) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000280)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0, r1, 0x0, 0x3}}, 0x20) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r3) syz_genetlink_get_family_id$gtp(&(0x7f0000000240), r3) write$RDMA_USER_CM_CMD_GET_EVENT(r3, &(0x7f0000000480)={0xc, 0x8, 0xfa00, {&(0x7f00000004c0)}}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x2, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000040), 0x1, {0xa, 0x7, 0xe57, @loopback}, r4}}, 0x38) socket$inet_udplite(0x2, 0x2, 0x88) 14:44:34 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "e0b3772264c43c79ea3709d20d36cc4637f10fb5de2d44e0a73f520c3612063189eaba7b99fa9556bcac2ba1fb34035db66efe1e7ea748d786f601d0dcc0875cb8313c7db8b6c64b414bd5a06373bc3fbdf80ab140bf4b8f6c4a991196664cd95bbff1abeb0e982cc9b17aac4b0381a35d7a53d098e99e432a3b2f69c8b9abd7356e7cc0700ff8a36c56bf3e8a01564cd35c263749dc7c61c59645ecda836dc9f9771ff0fcdeec9e4d22cc1722bacd35e0096e747dac83ef85aed84e433e8b13e27f70ad877ff1a53934e230ed382a6c4ff7a6c1d3bb2cee4b336dcd368e29a06ed88efe1806f129bfbdfccf6c5e3ba935eb8ad0af3928b311e0a1c89eca9c75"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000100), 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "13bd94e32c37a3932d8ad7271907f2903ccf3bb13b387d8fdf025cdf3c8faa37a970ea456fa2fd6f8354fc3b05088269a6d5b022e392b9bd78e5e2308e054c3e2cbb6e61b42c74f3c1ba8d63d10ed85dcc5d58071547cdfd9661f05024bcf8d7722e987a76fced66d3b33373d61da648b231fe3de6f7dc9a78420b7bf0a04efb660e06f2bf671a2060d09d80f7ee6ba3ae0b6edf87d14be34012ef95719e01f065ec7943a48dcce0fcf8f7f3a89c24d940f201c7c73a3c97872a80ca25d1a3114fe16f225f4f55f3c6456cab8f0aa59d8efdc6939eb7f2b223ceff25db5222ff8e86c024229beec9ce765151d6e706fd60ab8ffe4c2e736eec4bcae53c1aaaef"}}}, 0x120) [ 3580.944440][ T3777] RSP: 002b:00007f11f5f92168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3580.952902][ T3777] RAX: ffffffffffffffda RBX: 00007f11f6f2ef60 RCX: 00007f11f6e1c059 [ 3580.960883][ T3777] RDX: 0000000020000260 RSI: 0000000020000140 RDI: 0000000000000003 [ 3580.968981][ T3777] RBP: 00007f11f5f921d0 R08: 0000000000000000 R09: 0000000000000000 [ 3580.976963][ T3777] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3580.984995][ T3777] R13: 00007ffcf4c849ff R14: 00007f11f5f92300 R15: 0000000000022000 [ 3580.992977][ T3777] 14:44:34 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000080)={0x16, 0x98, 0xfa00, {&(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0xffffffffffffffff, 0x10, 0x1, @in={0x2, 0x4e20, @remote}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000140)={0x11, 0x10, 0xfa00, {&(0x7f0000000000), r2}}, 0x18) 14:44:34 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x20000260) (fail_nth: 8) 14:44:34 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) (async) socket$inet_udplite(0x2, 0x2, 0x88) (async) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r2) write$selinux_attr(r2, &(0x7f0000000000)='system_u:object_r:tmpreaper_exec_t:s0\x00', 0x26) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000280)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0, r1, 0x0, 0x3}}, 0x20) (async) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r3) syz_genetlink_get_family_id$gtp(&(0x7f0000000240), r3) write$RDMA_USER_CM_CMD_GET_EVENT(r3, &(0x7f0000000480)={0xc, 0x8, 0xfa00, {&(0x7f00000004c0)}}, 0x10) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x2, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000040), 0x1, {0xa, 0x7, 0xe57, @loopback}, r4}}, 0x38) (async) socket$inet_udplite(0x2, 0x2, 0x88) 14:44:34 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000100), 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) 14:44:34 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) (async) socket$inet_sctp(0x2, 0x0, 0x84) (async) r1 = socket(0x10, 0x804, 0x3) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000280)={0x200}, 0x4) (async) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="0c010000", @ANYRES16=r2, @ANYBLOB="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"], 0x10c}, 0x1, 0x0, 0x0, 0x4000840}, 0x4008000) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) (async) r3 = socket$inet(0x2, 0xa, 0x1) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r3, 0x84, 0xc, &(0x7f0000000000), 0x4) (async) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) 14:44:34 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x20000260) (fail_nth: 9) [ 3581.457123][ T3799] FAULT_INJECTION: forcing a failure. [ 3581.457123][ T3799] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3581.470241][ T3799] CPU: 1 PID: 3799 Comm: syz-executor.1 Not tainted 5.17.0-rc2-syzkaller-00167-gdcb85f85fa6f-dirty #0 [ 3581.481216][ T3799] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3581.491044][ T3803] FAULT_INJECTION: forcing a failure. [ 3581.491044][ T3803] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3581.491408][ T3799] Call Trace: [ 3581.491416][ T3799] [ 3581.491422][ T3799] dump_stack_lvl+0xd6/0x122 [ 3581.515588][ T3799] dump_stack+0x11/0x1b [ 3581.519808][ T3799] should_fail+0x23c/0x250 [ 3581.524215][ T3799] should_fail_usercopy+0x16/0x20 [ 3581.529228][ T3799] copy_page_from_iter_atomic+0x2f1/0xcd0 [ 3581.534942][ T3799] ? shmem_write_begin+0x7e/0x100 [ 3581.539958][ T3799] generic_perform_write+0x211/0x400 [ 3581.545232][ T3799] ? shmem_write_begin+0x100/0x100 [ 3581.550414][ T3799] __generic_file_write_iter+0xf7/0x2b0 [ 3581.555948][ T3799] ? generic_write_checks+0x242/0x290 [ 3581.561312][ T3799] generic_file_write_iter+0x75/0x130 [ 3581.566731][ T3799] vfs_write+0x7f5/0x950 [ 3581.571025][ T3799] ksys_write+0xd9/0x190 [ 3581.575262][ T3799] __x64_sys_write+0x3e/0x50 [ 3581.579887][ T3799] do_syscall_64+0x44/0xd0 [ 3581.584318][ T3799] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3581.590245][ T3799] RIP: 0033:0x7f11f6e1c059 [ 3581.594698][ T3799] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 3581.614296][ T3799] RSP: 002b:00007f11f5f92168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3581.622725][ T3799] RAX: ffffffffffffffda RBX: 00007f11f6f2ef60 RCX: 00007f11f6e1c059 [ 3581.630698][ T3799] RDX: 0000000020000260 RSI: 0000000020000140 RDI: 0000000000000003 [ 3581.638659][ T3799] RBP: 00007f11f5f921d0 R08: 0000000000000000 R09: 0000000000000000 [ 3581.646621][ T3799] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3581.654582][ T3799] R13: 00007ffcf4c849ff R14: 00007f11f5f92300 R15: 0000000000022000 [ 3581.662543][ T3799] [ 3581.665551][ T3803] CPU: 0 PID: 3803 Comm: syz-executor.0 Not tainted 5.17.0-rc2-syzkaller-00167-gdcb85f85fa6f-dirty #0 [ 3581.676624][ T3803] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3581.686678][ T3803] Call Trace: [ 3581.689952][ T3803] [ 3581.692877][ T3803] dump_stack_lvl+0xd6/0x122 [ 3581.697477][ T3803] dump_stack+0x11/0x1b [ 3581.701644][ T3803] should_fail+0x23c/0x250 14:44:34 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000080)={0x16, 0x98, 0xfa00, {&(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0xffffffffffffffff, 0x10, 0x1, @in={0x2, 0x4e20, @remote}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000140)={0x11, 0x10, 0xfa00, {&(0x7f0000000000), r2}}, 0x18) 14:44:34 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "e0b3772264c43c79ea3709d20d36cc4637f10fb5de2d44e0a73f520c3612063189eaba7b99fa9556bcac2ba1fb34035db66efe1e7ea748d786f601d0dcc0875cb8313c7db8b6c64b414bd5a06373bc3fbdf80ab140bf4b8f6c4a991196664cd95bbff1abeb0e982cc9b17aac4b0381a35d7a53d098e99e432a3b2f69c8b9abd7356e7cc0700ff8a36c56bf3e8a01564cd35c263749dc7c61c59645ecda836dc9f9771ff0fcdeec9e4d22cc1722bacd35e0096e747dac83ef85aed84e433e8b13e27f70ad877ff1a53934e230ed382a6c4ff7a6c1d3bb2cee4b336dcd368e29a06ed88efe1806f129bfbdfccf6c5e3ba935eb8ad0af3928b311e0a1c89eca9c75"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000100), 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) [ 3581.706350][ T3803] __alloc_pages+0x102/0x330 [ 3581.710982][ T3803] alloc_pages_vma+0x67e/0x810 [ 3581.715752][ T3803] ? percpu_counter_add_batch+0x109/0x130 [ 3581.721510][ T3803] shmem_getpage_gfp+0x8b4/0x12c0 [ 3581.726634][ T3803] ? do_user_addr_fault+0x7d4/0xb90 [ 3581.731905][ T3803] shmem_write_begin+0x7e/0x100 [ 3581.736766][ T3803] generic_perform_write+0x1c8/0x400 [ 3581.742057][ T3803] ? shmem_write_begin+0x100/0x100 [ 3581.747178][ T3803] __generic_file_write_iter+0xf7/0x2b0 [ 3581.752817][ T3803] ? generic_write_checks+0x242/0x290 14:44:34 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) socket$inet_udplite(0x2, 0x2, 0x88) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r2) write$selinux_attr(r2, &(0x7f0000000000)='system_u:object_r:tmpreaper_exec_t:s0\x00', 0x26) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000280)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0, r1, 0x0, 0x3}}, 0x20) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r3) syz_genetlink_get_family_id$gtp(&(0x7f0000000240), r3) write$RDMA_USER_CM_CMD_GET_EVENT(r3, &(0x7f0000000480)={0xc, 0x8, 0xfa00, {&(0x7f00000004c0)}}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x2, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000040), 0x1, {0xa, 0x7, 0xe57, @loopback}, r4}}, 0x38) socket$inet_udplite(0x2, 0x2, 0x88) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080), 0x2}}, 0x20) (async) socket$inet_udplite(0x2, 0x2, 0x88) (async) openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) (async) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r2) (async) write$selinux_attr(r2, &(0x7f0000000000)='system_u:object_r:tmpreaper_exec_t:s0\x00', 0x26) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000280)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0, r1, 0x0, 0x3}}, 0x20) (async) openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) (async) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r3) (async) syz_genetlink_get_family_id$gtp(&(0x7f0000000240), r3) (async) write$RDMA_USER_CM_CMD_GET_EVENT(r3, &(0x7f0000000480)={0xc, 0x8, 0xfa00, {&(0x7f00000004c0)}}, 0x10) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140), 0x2, 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000040), 0x1, {0xa, 0x7, 0xe57, @loopback}, r4}}, 0x38) (async) socket$inet_udplite(0x2, 0x2, 0x88) (async) [ 3581.758222][ T3803] generic_file_write_iter+0x75/0x130 [ 3581.763607][ T3803] vfs_write+0x7f5/0x950 [ 3581.767863][ T3803] ksys_write+0xd9/0x190 [ 3581.772116][ T3803] __x64_sys_write+0x3e/0x50 [ 3581.776720][ T3803] do_syscall_64+0x44/0xd0 [ 3581.781141][ T3803] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3581.787036][ T3803] RIP: 0033:0x7f9e8db3d059 14:44:34 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "13bd94e32c37a3932d8ad7271907f2903ccf3bb13b387d8fdf025cdf3c8faa37a970ea456fa2fd6f8354fc3b05088269a6d5b022e392b9bd78e5e2308e054c3e2cbb6e61b42c74f3c1ba8d63d10ed85dcc5d58071547cdfd9661f05024bcf8d7722e987a76fced66d3b33373d61da648b231fe3de6f7dc9a78420b7bf0a04efb660e06f2bf671a2060d09d80f7ee6ba3ae0b6edf87d14be34012ef95719e01f065ec7943a48dcce0fcf8f7f3a89c24d940f201c7c73a3c97872a80ca25d1a3114fe16f225f4f55f3c6456cab8f0aa59d8efdc6939eb7f2b223ceff25db5222ff8e86c024229beec9ce765151d6e706fd60ab8ffe4c2e736eec4bcae53c1aaaef"}}}, 0x20000260) (fail_nth: 10) [ 3581.791447][ T3803] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 3581.811060][ T3803] RSP: 002b:00007f9e8ccb3168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3581.819481][ T3803] RAX: ffffffffffffffda RBX: 00007f9e8dc4ff60 RCX: 00007f9e8db3d059 [ 3581.821664][ T3815] FAULT_INJECTION: forcing a failure. [ 3581.821664][ T3815] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3581.827459][ T3803] RDX: 0000000020000260 RSI: 0000000020000140 RDI: 0000000000000003 [ 3581.827476][ T3803] RBP: 00007f9e8ccb31d0 R08: 0000000000000000 R09: 0000000000000000 [ 3581.856574][ T3803] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3581.864558][ T3803] R13: 00007ffe952cf46f R14: 00007f9e8ccb3300 R15: 0000000000022000 [ 3581.872526][ T3803] [ 3581.875532][ T3815] CPU: 1 PID: 3815 Comm: syz-executor.1 Not tainted 5.17.0-rc2-syzkaller-00167-gdcb85f85fa6f-dirty #0 [ 3581.886476][ T3815] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3581.896536][ T3815] Call Trace: [ 3581.899813][ T3815] [ 3581.902812][ T3815] dump_stack_lvl+0xd6/0x122 [ 3581.907450][ T3815] dump_stack+0x11/0x1b [ 3581.911613][ T3815] should_fail+0x23c/0x250 [ 3581.916033][ T3815] __alloc_pages+0x102/0x330 [ 3581.920633][ T3815] alloc_pages_vma+0x67e/0x810 [ 3581.925424][ T3815] ? percpu_counter_add_batch+0x109/0x130 [ 3581.931154][ T3815] shmem_getpage_gfp+0x8b4/0x12c0 [ 3581.936265][ T3815] ? do_user_addr_fault+0x7d4/0xb90 [ 3581.941521][ T3815] shmem_write_begin+0x7e/0x100 [ 3581.946451][ T3815] generic_perform_write+0x1c8/0x400 [ 3581.951744][ T3815] ? shmem_write_begin+0x100/0x100 14:44:35 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x20000260) (fail_nth: 9) 14:44:35 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000080)={0x16, 0x98, 0xfa00, {&(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0xffffffffffffffff, 0x10, 0x1, @in={0x2, 0x4e20, @remote}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000140)={0x11, 0x10, 0xfa00, {&(0x7f0000000000), r2}}, 0x18) openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000080)={0x16, 0x98, 0xfa00, {&(0x7f0000000040), 0x2, 0xffffffffffffffff, 0x10, 0x1, @in={0x2, 0x4e20, @remote}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000140)={0x11, 0x10, 0xfa00, {&(0x7f0000000000), r2}}, 0x18) (async) 14:44:35 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000100), 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) 14:44:35 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(0xffffffffffffffff, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000100), 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "13bd94e32c37a3932d8ad7271907f2903ccf3bb13b387d8fdf025cdf3c8faa37a970ea456fa2fd6f8354fc3b05088269a6d5b022e392b9bd78e5e2308e054c3e2cbb6e61b42c74f3c1ba8d63d10ed85dcc5d58071547cdfd9661f05024bcf8d7722e987a76fced66d3b33373d61da648b231fe3de6f7dc9a78420b7bf0a04efb660e06f2bf671a2060d09d80f7ee6ba3ae0b6edf87d14be34012ef95719e01f065ec7943a48dcce0fcf8f7f3a89c24d940f201c7c73a3c97872a80ca25d1a3114fe16f225f4f55f3c6456cab8f0aa59d8efdc6939eb7f2b223ceff25db5222ff8e86c024229beec9ce765151d6e706fd60ab8ffe4c2e736eec4bcae53c1aaaef"}}}, 0x120) 14:44:35 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(0xffffffffffffffff, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000100), 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) 14:44:35 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(0xffffffffffffffff, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000100), 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) [ 3581.956872][ T3815] __generic_file_write_iter+0xf7/0x2b0 [ 3581.962429][ T3815] ? generic_write_checks+0x242/0x290 [ 3581.967889][ T3815] generic_file_write_iter+0x75/0x130 [ 3581.973273][ T3815] vfs_write+0x7f5/0x950 [ 3581.977609][ T3815] ksys_write+0xd9/0x190 [ 3581.981973][ T3815] __x64_sys_write+0x3e/0x50 [ 3581.985030][ T3841] FAULT_INJECTION: forcing a failure. [ 3581.985030][ T3841] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3581.986580][ T3815] do_syscall_64+0x44/0xd0 [ 3582.004111][ T3815] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3582.010020][ T3815] RIP: 0033:0x7f11f6e1c059 [ 3582.014485][ T3815] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 3582.034079][ T3815] RSP: 002b:00007f11f5f92168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3582.042478][ T3815] RAX: ffffffffffffffda RBX: 00007f11f6f2ef60 RCX: 00007f11f6e1c059 [ 3582.050441][ T3815] RDX: 0000000020000260 RSI: 0000000020000140 RDI: 0000000000000003 [ 3582.058399][ T3815] RBP: 00007f11f5f921d0 R08: 0000000000000000 R09: 0000000000000000 [ 3582.066360][ T3815] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3582.074319][ T3815] R13: 00007ffcf4c849ff R14: 00007f11f5f92300 R15: 0000000000022000 [ 3582.082340][ T3815] [ 3582.085345][ T3841] CPU: 0 PID: 3841 Comm: syz-executor.0 Not tainted 5.17.0-rc2-syzkaller-00167-gdcb85f85fa6f-dirty #0 [ 3582.096287][ T3841] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3582.106415][ T3841] Call Trace: 14:44:35 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) socket$inet_sctp(0x2, 0x0, 0x84) r1 = socket(0x10, 0x804, 0x3) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000280)={0x200}, 0x4) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="0c010000", @ANYRES16=r2, @ANYBLOB="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"], 0x10c}, 0x1, 0x0, 0x0, 0x4000840}, 0x4008000) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) r3 = socket$inet(0x2, 0xa, 0x1) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r3, 0x84, 0xc, &(0x7f0000000000), 0x4) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "13bd94e32c37a3932d8ad7271907f2903ccf3bb13b387d8fdf025cdf3c8faa37a970ea456fa2fd6f8354fc3b05088269a6d5b022e392b9bd78e5e2308e054c3e2cbb6e61b42c74f3c1ba8d63d10ed85dcc5d58071547cdfd9661f05024bcf8d7722e987a76fced66d3b33373d61da648b231fe3de6f7dc9a78420b7bf0a04efb660e06f2bf671a2060d09d80f7ee6ba3ae0b6edf87d14be34012ef95719e01f065ec7943a48dcce0fcf8f7f3a89c24d940f201c7c73a3c97872a80ca25d1a3114fe16f225f4f55f3c6456cab8f0aa59d8efdc6939eb7f2b223ceff25db5222ff8e86c024229beec9ce765151d6e706fd60ab8ffe4c2e736eec4bcae53c1aaaef"}}}, 0x120) openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) (async) socket$inet_sctp(0x2, 0x0, 0x84) (async) socket(0x10, 0x804, 0x3) (async) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000280)={0x200}, 0x4) (async) syz_genetlink_get_family_id$devlink(&(0x7f0000000080), 0xffffffffffffffff) (async) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="0c010000", @ANYRES16=r2, @ANYBLOB="02002bbd7000fddbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b00090000000600160005000000050012000100000008000100706369001100020030303030080000000000000200000000080003000300000008000b0003000000060016006138000005001200010000000e0001006e657464657654acdcac56ae9daa0264d0657464658b73696d300000080003000300000008000b0081000000060016c91fad6ba74f325770c88fd7003f00050005001200010000000e0001006e657464657673696d0000000f0002006e657464657633696d300000080003000000000008000b00000000800600160081000000050012000100000090fd5958"], 0x10c}, 0x1, 0x0, 0x0, 0x4000840}, 0x4008000) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) (async) socket$inet(0x2, 0xa, 0x1) (async) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r3, 0x84, 0xc, &(0x7f0000000000), 0x4) (async) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) (async) 14:44:35 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000100), 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "13bd94e32c37a3932d8ad7271907f2903ccf3bb13b387d8fdf025cdf3c8faa37a970ea456fa2fd6f8354fc3b05088269a6d5b022e392b9bd78e5e2308e054c3e2cbb6e61b42c74f3c1ba8d63d10ed85dcc5d58071547cdfd9661f05024bcf8d7722e987a76fced66d3b33373d61da648b231fe3de6f7dc9a78420b7bf0a04efb660e06f2bf671a2060d09d80f7ee6ba3ae0b6edf87d14be34012ef95719e01f065ec7943a48dcce0fcf8f7f3a89c24d940f201c7c73a3c97872a80ca25d1a3114fe16f225f4f55f3c6456cab8f0aa59d8efdc6939eb7f2b223ceff25db5222ff8e86c024229beec9ce765151d6e706fd60ab8ffe4c2e736eec4bcae53c1aaaef"}}}, 0x120) 14:44:35 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r2) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000000)={0xffffffffffffffff}, 0x2, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f0000000140)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0x8, @mcast2, 0x81}, {0xa, 0x4e21, 0x2, @loopback}, r3, 0x3ff}}, 0x48) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000280)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0, r1, 0x0, 0x3}}, 0x20) 14:44:35 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x20000260) (fail_nth: 11) 14:44:35 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x13f, 0x6}}, 0x20) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RATE_GET(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x64, r1, 0x100, 0x70bd2b, 0x25dfdbff, {}, [@handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_RATE_NODE_NAME={0xe}, @handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}]}, 0x64}, 0x1, 0x0, 0x0, 0x24048084}, 0x0) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000140)={&(0x7f0000000600)={0xd0, r1, 0x8, 0x70bd29, 0x25dfdbfc, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}, {0x8, 0xb, 0x7f}, {0x6, 0x16, 0x4}, {0x5}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x7}, {0xfffffffffffffee2, 0x16, 0x5}, {0x5, 0x12, 0x1}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x1ff}, {0x6, 0x16, 0x6}, {0x5}}]}, 0xd0}, 0x1, 0x0, 0x0, 0x40050}, 0x20000000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r2) sendmsg$DEVLINK_CMD_PORT_UNSPLIT(r2, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)={0xf8, r1, 0x304, 0x70bd26, 0x25dfdbfe, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x1}}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x3}}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x3}}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}}]}, 0xf8}, 0x1, 0x0, 0x0, 0x8000}, 0x4000) openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) 14:44:35 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x13f, 0x6}}, 0x20) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RATE_GET(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x64, r1, 0x100, 0x70bd2b, 0x25dfdbff, {}, [@handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_RATE_NODE_NAME={0xe}, @handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}]}, 0x64}, 0x1, 0x0, 0x0, 0x24048084}, 0x0) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000140)={&(0x7f0000000600)={0xd0, r1, 0x8, 0x70bd29, 0x25dfdbfc, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}, {0x8, 0xb, 0x7f}, {0x6, 0x16, 0x4}, {0x5}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x7}, {0xfffffffffffffee2, 0x16, 0x5}, {0x5, 0x12, 0x1}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x1ff}, {0x6, 0x16, 0x6}, {0x5}}]}, 0xd0}, 0x1, 0x0, 0x0, 0x40050}, 0x20000000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r2) sendmsg$DEVLINK_CMD_PORT_UNSPLIT(r2, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)={0xf8, r1, 0x304, 0x70bd26, 0x25dfdbfe, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x1}}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x3}}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x3}}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}}]}, 0xf8}, 0x1, 0x0, 0x0, 0x8000}, 0x4000) openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) (async) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x13f, 0x6}}, 0x20) (async) syz_genetlink_get_family_id$devlink(&(0x7f0000000080), 0xffffffffffffffff) (async) sendmsg$DEVLINK_CMD_RATE_GET(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x64, r1, 0x100, 0x70bd2b, 0x25dfdbff, {}, [@handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_RATE_NODE_NAME={0xe}, @handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}]}, 0x64}, 0x1, 0x0, 0x0, 0x24048084}, 0x0) (async) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000140)={&(0x7f0000000600)={0xd0, r1, 0x8, 0x70bd29, 0x25dfdbfc, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}, {0x8, 0xb, 0x7f}, {0x6, 0x16, 0x4}, {0x5}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x7}, {0xfffffffffffffee2, 0x16, 0x5}, {0x5, 0x12, 0x1}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x1ff}, {0x6, 0x16, 0x6}, {0x5}}]}, 0xd0}, 0x1, 0x0, 0x0, 0x40050}, 0x20000000) (async) openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) (async) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r2) (async) sendmsg$DEVLINK_CMD_PORT_UNSPLIT(r2, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)={0xf8, r1, 0x304, 0x70bd26, 0x25dfdbfe, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x1}}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x3}}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x3}}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}}]}, 0xf8}, 0x1, 0x0, 0x0, 0x8000}, 0x4000) (async) openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) (async) [ 3582.109696][ T3841] [ 3582.112624][ T3841] dump_stack_lvl+0xd6/0x122 [ 3582.117223][ T3841] dump_stack+0x11/0x1b [ 3582.121458][ T3841] should_fail+0x23c/0x250 [ 3582.125967][ T3841] should_fail_usercopy+0x16/0x20 [ 3582.131008][ T3841] copy_page_from_iter_atomic+0x2f1/0xcd0 [ 3582.136813][ T3841] ? shmem_write_begin+0x7e/0x100 [ 3582.141901][ T3841] generic_perform_write+0x211/0x400 [ 3582.147201][ T3841] ? shmem_write_begin+0x100/0x100 [ 3582.152333][ T3841] __generic_file_write_iter+0xf7/0x2b0 [ 3582.157893][ T3841] ? generic_write_checks+0x242/0x290 [ 3582.161993][ T3862] FAULT_INJECTION: forcing a failure. [ 3582.161993][ T3862] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3582.163271][ T3841] generic_file_write_iter+0x75/0x130 [ 3582.181721][ T3841] vfs_write+0x7f5/0x950 [ 3582.185995][ T3841] ksys_write+0xd9/0x190 [ 3582.190316][ T3841] __x64_sys_write+0x3e/0x50 [ 3582.194902][ T3841] do_syscall_64+0x44/0xd0 [ 3582.199320][ T3841] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3582.205209][ T3841] RIP: 0033:0x7f9e8db3d059 [ 3582.209709][ T3841] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 3582.229305][ T3841] RSP: 002b:00007f9e8ccb3168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3582.237714][ T3841] RAX: ffffffffffffffda RBX: 00007f9e8dc4ff60 RCX: 00007f9e8db3d059 [ 3582.245687][ T3841] RDX: 0000000020000260 RSI: 0000000020000140 RDI: 0000000000000003 [ 3582.253650][ T3841] RBP: 00007f9e8ccb31d0 R08: 0000000000000000 R09: 0000000000000000 [ 3582.261656][ T3841] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3582.269616][ T3841] R13: 00007ffe952cf46f R14: 00007f9e8ccb3300 R15: 0000000000022000 [ 3582.277622][ T3841] [ 3582.280631][ T3862] CPU: 1 PID: 3862 Comm: syz-executor.1 Not tainted 5.17.0-rc2-syzkaller-00167-gdcb85f85fa6f-dirty #0 [ 3582.291580][ T3862] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3582.301642][ T3862] Call Trace: [ 3582.304934][ T3862] [ 3582.307877][ T3862] dump_stack_lvl+0xd6/0x122 [ 3582.312496][ T3862] dump_stack+0x11/0x1b [ 3582.316656][ T3862] should_fail+0x23c/0x250 [ 3582.321162][ T3862] should_fail_usercopy+0x16/0x20 [ 3582.326266][ T3862] copy_page_from_iter_atomic+0x2f1/0xcd0 [ 3582.332066][ T3862] ? shmem_write_begin+0x7e/0x100 [ 3582.337183][ T3862] generic_perform_write+0x211/0x400 [ 3582.342471][ T3862] ? shmem_write_begin+0x100/0x100 [ 3582.347586][ T3862] __generic_file_write_iter+0xf7/0x2b0 [ 3582.353201][ T3862] ? generic_write_checks+0x242/0x290 [ 3582.358580][ T3862] generic_file_write_iter+0x75/0x130 [ 3582.363953][ T3862] vfs_write+0x7f5/0x950 [ 3582.368317][ T3862] ksys_write+0xd9/0x190 [ 3582.372589][ T3862] __x64_sys_write+0x3e/0x50 [ 3582.377260][ T3862] do_syscall_64+0x44/0xd0 [ 3582.381687][ T3862] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3582.387619][ T3862] RIP: 0033:0x7f11f6e1c059 [ 3582.392051][ T3862] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 3582.411662][ T3862] RSP: 002b:00007f11f5f92168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3582.420155][ T3862] RAX: ffffffffffffffda RBX: 00007f11f6f2ef60 RCX: 00007f11f6e1c059 [ 3582.428137][ T3862] RDX: 0000000020000260 RSI: 0000000020000140 RDI: 0000000000000003 [ 3582.436118][ T3862] RBP: 00007f11f5f921d0 R08: 0000000000000000 R09: 0000000000000000 [ 3582.444092][ T3862] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3582.452067][ T3862] R13: 00007ffcf4c849ff R14: 00007f11f5f92300 R15: 0000000000022000 14:44:35 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x20000260) (fail_nth: 10) 14:44:35 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x13f, 0x6}}, 0x20) (async) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RATE_GET(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x64, r1, 0x100, 0x70bd2b, 0x25dfdbff, {}, [@handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_RATE_NODE_NAME={0xe}, @handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}]}, 0x64}, 0x1, 0x0, 0x0, 0x24048084}, 0x0) (async) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000140)={&(0x7f0000000600)={0xd0, r1, 0x8, 0x70bd29, 0x25dfdbfc, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}, {0x8, 0xb, 0x7f}, {0x6, 0x16, 0x4}, {0x5}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x7}, {0xfffffffffffffee2, 0x16, 0x5}, {0x5, 0x12, 0x1}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x1ff}, {0x6, 0x16, 0x6}, {0x5}}]}, 0xd0}, 0x1, 0x0, 0x0, 0x40050}, 0x20000000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r2) sendmsg$DEVLINK_CMD_PORT_UNSPLIT(r2, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)={0xf8, r1, 0x304, 0x70bd26, 0x25dfdbfe, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x1}}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x3}}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x3}}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}}]}, 0xf8}, 0x1, 0x0, 0x0, 0x8000}, 0x4000) (async) openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) 14:44:35 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000100), 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) 14:44:35 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) (async) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r2) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000000)={0xffffffffffffffff}, 0x2, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f0000000140)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0x8, @mcast2, 0x81}, {0xa, 0x4e21, 0x2, @loopback}, r3, 0x3ff}}, 0x48) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000280)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0, r1, 0x0, 0x3}}, 0x20) 14:44:35 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000100), 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "13bd94e32c37a3932d8ad7271907f2903ccf3bb13b387d8fdf025cdf3c8faa37a970ea456fa2fd6f8354fc3b05088269a6d5b022e392b9bd78e5e2308e054c3e2cbb6e61b42c74f3c1ba8d63d10ed85dcc5d58071547cdfd9661f05024bcf8d7722e987a76fced66d3b33373d61da648b231fe3de6f7dc9a78420b7bf0a04efb660e06f2bf671a2060d09d80f7ee6ba3ae0b6edf87d14be34012ef95719e01f065ec7943a48dcce0fcf8f7f3a89c24d940f201c7c73a3c97872a80ca25d1a3114fe16f225f4f55f3c6456cab8f0aa59d8efdc6939eb7f2b223ceff25db5222ff8e86c024229beec9ce765151d6e706fd60ab8ffe4c2e736eec4bcae53c1aaaef"}}}, 0x120) [ 3582.455379][ T3882] FAULT_INJECTION: forcing a failure. [ 3582.455379][ T3882] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3582.460046][ T3862] [ 3582.476363][ T3882] CPU: 0 PID: 3882 Comm: syz-executor.0 Not tainted 5.17.0-rc2-syzkaller-00167-gdcb85f85fa6f-dirty #0 [ 3582.487311][ T3882] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3582.497405][ T3882] Call Trace: [ 3582.500703][ T3882] [ 3582.503628][ T3882] dump_stack_lvl+0xd6/0x122 14:44:35 executing program 4: fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000380)=')\xcf!#}{\x00', 0x0, 0xffffffffffffffff) r0 = openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r3}}, 0x10) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000000)=[{0x2c, 0x0, [0x1, 0x0, 0x3, 0xda, 0x9, 0x7fffffff, 0x9, 0x7ff, 0x8, 0x1f, 0x1, 0x80, 0x2, 0x400, 0x7fff, 0x80000000]}, {0x8, 0x0, [0xaa36, 0xc08, 0x400, 0x7fffffff, 0x825, 0x9024, 0x2, 0xfad6, 0x80, 0x1, 0x1ff, 0x9, 0x8, 0x9, 0xb5f4, 0xff]}, {0x1, 0x0, [0x3, 0x5, 0x4, 0x2, 0x9, 0x5, 0xfffffff8, 0x2, 0x1, 0x0, 0xffffffff, 0x7, 0xfff, 0x8, 0xfff, 0x6]}], r3, 0x1, 0x1, 0xd8}}, 0x20) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000001c0)={0xffffffffffffffff}, 0x5068f006458f19d6, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r4, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0x81, 0x6, "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", 0x6, 0x6, 0x3, 0x3f, 0x9, 0x81, 0xfa, 0x1}, r5}}, 0x120) [ 3582.508288][ T3882] dump_stack+0x11/0x1b [ 3582.512502][ T3882] should_fail+0x23c/0x250 [ 3582.516930][ T3882] __alloc_pages+0x102/0x330 [ 3582.521558][ T3882] alloc_pages_vma+0x67e/0x810 [ 3582.526383][ T3882] ? percpu_counter_add_batch+0x109/0x130 [ 3582.532102][ T3882] shmem_getpage_gfp+0x8b4/0x12c0 [ 3582.537158][ T3882] ? do_user_addr_fault+0x7d4/0xb90 [ 3582.542370][ T3882] shmem_write_begin+0x7e/0x100 [ 3582.547390][ T3882] generic_perform_write+0x1c8/0x400 [ 3582.552689][ T3882] ? shmem_write_begin+0x100/0x100 [ 3582.557818][ T3882] __generic_file_write_iter+0xf7/0x2b0 [ 3582.563369][ T3882] ? generic_write_checks+0x242/0x290 [ 3582.568747][ T3882] generic_file_write_iter+0x75/0x130 [ 3582.574127][ T3882] vfs_write+0x7f5/0x950 [ 3582.578374][ T3882] ksys_write+0xd9/0x190 [ 3582.582616][ T3882] __x64_sys_write+0x3e/0x50 [ 3582.587201][ T3882] do_syscall_64+0x44/0xd0 [ 3582.591613][ T3882] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3582.597512][ T3882] RIP: 0033:0x7f9e8db3d059 [ 3582.601921][ T3882] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 3582.621701][ T3882] RSP: 002b:00007f9e8ccb3168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3582.630123][ T3882] RAX: ffffffffffffffda RBX: 00007f9e8dc4ff60 RCX: 00007f9e8db3d059 [ 3582.638102][ T3882] RDX: 0000000020000260 RSI: 0000000020000140 RDI: 0000000000000003 [ 3582.646077][ T3882] RBP: 00007f9e8ccb31d0 R08: 0000000000000000 R09: 0000000000000000 [ 3582.654052][ T3882] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 14:44:35 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$P9_RXATTRCREATE(r0, &(0x7f0000000700)={0x7, 0x21, 0x2}, 0x7) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r1) mq_getsetattr(r1, &(0x7f00000007c0)={0x0, 0x6, 0x6, 0x7fff}, &(0x7f0000000800)) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r0, &(0x7f0000000880)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000280)={&(0x7f00000008c0)=ANY=[@ANYBLOB="6c010000", @ANYRES16=0x0, @ANYBLOB="00012abd7000ffdbdf251c000000080001007063690011000200303030303a30303a31302e300000000008000b00050000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008000b0000100000080001007063690011000200303030303a30303a31302e300000000008000b00900e00000e0001006e657464657673696d0000000f0002006e657464657673696d30000008000b007f9b90690e0001006e657464657673696d0000000f0002006e657464657673696d30000008000b00060000000e0001006e657464657673696d25989cf1be3f0000000f0002006e657464657673696d30000008000b005f36ae71080001007063690011000200303030303a30303a31302e300000000008000b0003000000080001007063690011000200303030303a30303a31302e300000000008000b00640000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008000b0002000000"], 0x16c}, 0x1, 0x0, 0x0, 0x4008094}, 0x40000) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f0000000040)={0x12, 0x10, 0xfa00, {&(0x7f0000000000), 0xffffffffffffffff, r0}}, 0x18) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000300)={0x16, 0x98, 0xfa00, {&(0x7f0000000080), 0x4, 0xffffffffffffffff, 0x1c, 0x1, @in={0x2, 0x4e24, @rand_addr=0x64010101}}}, 0xa0) write$P9_RSTAT(r0, &(0x7f0000000740)={0x5f, 0x7d, 0x2, {0x0, 0x58, 0xf926, 0x22, {0x80, 0x2, 0x3}, 0x102e0000, 0x93, 0x8000, 0x9, 0x9, '/dev/bsg\x00', 0xa, '!.}[:\xb0^!1\x06', 0x9, '/dev/bsg\x00', 0x9, '/dev/bsg\x00'}}, 0x5f) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000500), 0xffffffffffffffff, 0x2}}, 0x18) eventfd2(0x101, 0x1) 14:44:35 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r2) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000000)={0xffffffffffffffff}, 0x2, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f0000000140)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0x8, @mcast2, 0x81}, {0xa, 0x4e21, 0x2, @loopback}, r3, 0x3ff}}, 0x48) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000280)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0, r1, 0x0, 0x3}}, 0x20) 14:44:35 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x20000260) (fail_nth: 12) 14:44:35 executing program 4: fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000380)=')\xcf!#}{\x00', 0x0, 0xffffffffffffffff) r0 = openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async, rerun: 64) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x13f, 0x5}}, 0x20) (rerun: 64) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r3}}, 0x10) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000000)=[{0x2c, 0x0, [0x1, 0x0, 0x3, 0xda, 0x9, 0x7fffffff, 0x9, 0x7ff, 0x8, 0x1f, 0x1, 0x80, 0x2, 0x400, 0x7fff, 0x80000000]}, {0x8, 0x0, [0xaa36, 0xc08, 0x400, 0x7fffffff, 0x825, 0x9024, 0x2, 0xfad6, 0x80, 0x1, 0x1ff, 0x9, 0x8, 0x9, 0xb5f4, 0xff]}, {0x1, 0x0, [0x3, 0x5, 0x4, 0x2, 0x9, 0x5, 0xfffffff8, 0x2, 0x1, 0x0, 0xffffffff, 0x7, 0xfff, 0x8, 0xfff, 0x6]}], r3, 0x1, 0x1, 0xd8}}, 0x20) (async) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) (async, rerun: 32) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000001c0)={0xffffffffffffffff}, 0x5068f006458f19d6, 0x6}}, 0x20) (rerun: 32) write$RDMA_USER_CM_CMD_CONNECT(r4, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0x81, 0x6, "e72e330a265951bc24fb7c6e8ad71d2c96b8499fa410dcb29e32171d22c15f43952487edfcda9e276a11e7572af3668df43cf6bb69e7e7b6cc3f58423b26ff3b1b29ed591e21945668ed763bf5d77dd3fdbb8ed3b13c0f184ae04a251d383b17358feb71c012fa89c5609a28c9354fbbdbae6053d3f241c1973d0ead0a2e0bad972c5709f7c9299eaa4a3aea7dc8896f823bc4c3d342ae7aec96a823c12ecf073830bd2b5def27de4a5419b4f412b4f69f59adc417594e3cae5befafed2b4a3fbd0ca65aab28551696b4ea5c77d314d3cf26bc6a5f27bbfbd345e165b2217e78052dd35eb05b33bbfd8581393d9a3a71c3591d1aed81af097ea5ee38f1011a76", 0x6, 0x6, 0x3, 0x3f, 0x9, 0x81, 0xfa, 0x1}, r5}}, 0x120) 14:44:35 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000100), 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) 14:44:35 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) (async) write$P9_RXATTRCREATE(r0, &(0x7f0000000700)={0x7, 0x21, 0x2}, 0x7) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r1) (async, rerun: 32) mq_getsetattr(r1, &(0x7f00000007c0)={0x0, 0x6, 0x6, 0x7fff}, &(0x7f0000000800)) (async, rerun: 32) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r0, &(0x7f0000000880)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000280)={&(0x7f00000008c0)=ANY=[@ANYBLOB="6c010000", @ANYRES16=0x0, @ANYBLOB="00012abd7000ffdbdf251c000000080001007063690011000200303030303a30303a31302e300000000008000b00050000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008000b0000100000080001007063690011000200303030303a30303a31302e300000000008000b00900e00000e0001006e657464657673696d0000000f0002006e657464657673696d30000008000b007f9b90690e0001006e657464657673696d0000000f0002006e657464657673696d30000008000b00060000000e0001006e657464657673696d25989cf1be3f0000000f0002006e657464657673696d30000008000b005f36ae71080001007063690011000200303030303a30303a31302e300000000008000b0003000000080001007063690011000200303030303a30303a31302e300000000008000b00640000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008000b0002000000"], 0x16c}, 0x1, 0x0, 0x0, 0x4008094}, 0x40000) (async) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f0000000040)={0x12, 0x10, 0xfa00, {&(0x7f0000000000), 0xffffffffffffffff, r0}}, 0x18) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000300)={0x16, 0x98, 0xfa00, {&(0x7f0000000080), 0x4, 0xffffffffffffffff, 0x1c, 0x1, @in={0x2, 0x4e24, @rand_addr=0x64010101}}}, 0xa0) write$P9_RSTAT(r0, &(0x7f0000000740)={0x5f, 0x7d, 0x2, {0x0, 0x58, 0xf926, 0x22, {0x80, 0x2, 0x3}, 0x102e0000, 0x93, 0x8000, 0x9, 0x9, '/dev/bsg\x00', 0xa, '!.}[:\xb0^!1\x06', 0x9, '/dev/bsg\x00', 0x9, '/dev/bsg\x00'}}, 0x5f) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) (async, rerun: 64) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000500), 0xffffffffffffffff, 0x2}}, 0x18) (async, rerun: 64) eventfd2(0x101, 0x1) [ 3582.662057][ T3882] R13: 00007ffe952cf46f R14: 00007f9e8ccb3300 R15: 0000000000022000 [ 3582.670091][ T3882] [ 3582.697728][ T3898] FAULT_INJECTION: forcing a failure. [ 3582.697728][ T3898] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3582.711046][ T3898] CPU: 1 PID: 3898 Comm: syz-executor.1 Not tainted 5.17.0-rc2-syzkaller-00167-gdcb85f85fa6f-dirty #0 [ 3582.722027][ T3898] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3582.732091][ T3898] Call Trace: [ 3582.735438][ T3898] [ 3582.738437][ T3898] dump_stack_lvl+0xd6/0x122 [ 3582.743050][ T3898] dump_stack+0x11/0x1b [ 3582.747240][ T3898] should_fail+0x23c/0x250 [ 3582.751701][ T3898] __alloc_pages+0x102/0x330 [ 3582.756305][ T3898] alloc_pages_vma+0x67e/0x810 14:44:35 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "13bd94e32c37a3932d8ad7271907f2903ccf3bb13b387d8fdf025cdf3c8faa37a970ea456fa2fd6f8354fc3b05088269a6d5b022e392b9bd78e5e2308e054c3e2cbb6e61b42c74f3c1ba8d63d10ed85dcc5d58071547cdfd9661f05024bcf8d7722e987a76fced66d3b33373d61da648b231fe3de6f7dc9a78420b7bf0a04efb660e06f2bf671a2060d09d80f7ee6ba3ae0b6edf87d14be34012ef95719e01f065ec7943a48dcce0fcf8f7f3a89c24d940f201c7c73a3c97872a80ca25d1a3114fe16f225f4f55f3c6456cab8f0aa59d8efdc6939eb7f2b223ceff25db5222ff8e86c024229beec9ce765151d6e706fd60ab8ffe4c2e736eec4bcae53c1aaaef"}}}, 0x20000260) (fail_nth: 11) 14:44:35 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000100), 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) 14:44:35 executing program 4: fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000380)=')\xcf!#}{\x00', 0x0, 0xffffffffffffffff) (async) r0 = openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) (async) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r3}}, 0x10) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000000)=[{0x2c, 0x0, [0x1, 0x0, 0x3, 0xda, 0x9, 0x7fffffff, 0x9, 0x7ff, 0x8, 0x1f, 0x1, 0x80, 0x2, 0x400, 0x7fff, 0x80000000]}, {0x8, 0x0, [0xaa36, 0xc08, 0x400, 0x7fffffff, 0x825, 0x9024, 0x2, 0xfad6, 0x80, 0x1, 0x1ff, 0x9, 0x8, 0x9, 0xb5f4, 0xff]}, {0x1, 0x0, [0x3, 0x5, 0x4, 0x2, 0x9, 0x5, 0xfffffff8, 0x2, 0x1, 0x0, 0xffffffff, 0x7, 0xfff, 0x8, 0xfff, 0x6]}], r3, 0x1, 0x1, 0xd8}}, 0x20) (async) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000001c0)={0xffffffffffffffff}, 0x5068f006458f19d6, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r4, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0x81, 0x6, "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", 0x6, 0x6, 0x3, 0x3f, 0x9, 0x81, 0xfa, 0x1}, r5}}, 0x120) 14:44:35 executing program 5: io_setup(0x7f, &(0x7f00000002c0)=0x0) io_cancel(r0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) io_pgetevents(r0, 0x8000, 0x2, &(0x7f0000000000)=[{}, {}], &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000180)={&(0x7f0000000140)={[0x90c0]}, 0x8}) io_setup(0x100, &(0x7f00000000c0)=0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380), 0x2, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000200), 0x470080, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000001c0)={0xffffffffffffffff}, 0x106, 0x2}}, 0x20) io_cancel(r1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x7, 0x1000, r2, &(0x7f00000003c0)="43c163477dc89a268bcbb8f2a047bbb69ae0c0d403c1b08f4fd6231fee7051e5bd50f596f468a42fd9b8306727a98b94086664e8b8d596dfcbb36281ae6bcc64bcfc9d75c14083cdd809cc6ea67d0ec4394ebb65497a1bd97599c52b058c99dd93156d9e67dbeb2f723c90c7182124979a58ac0a29bb345e1e544dbb087dd889c45a84c2078cf2d12e7dd6c37f7efe7169e3c98eca0f61f7014a5fa0d221a20047f972f5cc652fc74c63c4cfb2ed175e91f7c4b6", 0xb4, 0x5025d181, 0x0, 0x2, r3}, &(0x7f0000000480)) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), 0xffffffffffffffff) ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000300)={'syztnl2\x00', 0x0, 0x29, 0x0, 0x30, 0x80, 0xc, @private0={0xfc, 0x0, '\x00', 0x1}, @empty, 0x80, 0x10, 0x6, 0x682}}) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000280)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0, r4, 0x0, 0x3}}, 0x20) 14:44:35 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$P9_RXATTRCREATE(r0, &(0x7f0000000700)={0x7, 0x21, 0x2}, 0x7) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r1) mq_getsetattr(r1, &(0x7f00000007c0)={0x0, 0x6, 0x6, 0x7fff}, &(0x7f0000000800)) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r0, &(0x7f0000000880)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000280)={&(0x7f00000008c0)=ANY=[@ANYBLOB="6c010000", @ANYRES16=0x0, @ANYBLOB="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"], 0x16c}, 0x1, 0x0, 0x0, 0x4008094}, 0x40000) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f0000000040)={0x12, 0x10, 0xfa00, {&(0x7f0000000000), 0xffffffffffffffff, r0}}, 0x18) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000300)={0x16, 0x98, 0xfa00, {&(0x7f0000000080), 0x4, 0xffffffffffffffff, 0x1c, 0x1, @in={0x2, 0x4e24, @rand_addr=0x64010101}}}, 0xa0) write$P9_RSTAT(r0, &(0x7f0000000740)={0x5f, 0x7d, 0x2, {0x0, 0x58, 0xf926, 0x22, {0x80, 0x2, 0x3}, 0x102e0000, 0x93, 0x8000, 0x9, 0x9, '/dev/bsg\x00', 0xa, '!.}[:\xb0^!1\x06', 0x9, '/dev/bsg\x00', 0x9, '/dev/bsg\x00'}}, 0x5f) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000500), 0xffffffffffffffff, 0x2}}, 0x18) eventfd2(0x101, 0x1) openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) (async) write$P9_RXATTRCREATE(r0, &(0x7f0000000700)={0x7, 0x21, 0x2}, 0x7) (async) openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) (async) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r1) (async) mq_getsetattr(r1, &(0x7f00000007c0)={0x0, 0x6, 0x6, 0x7fff}, &(0x7f0000000800)) (async) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r0, &(0x7f0000000880)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000280)={&(0x7f00000008c0)=ANY=[@ANYBLOB="6c010000", @ANYRES16=0x0, @ANYBLOB="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"], 0x16c}, 0x1, 0x0, 0x0, 0x4008094}, 0x40000) (async) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f0000000040)={0x12, 0x10, 0xfa00, {&(0x7f0000000000), 0xffffffffffffffff, r0}}, 0x18) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000300)={0x16, 0x98, 0xfa00, {&(0x7f0000000080), 0x4, 0xffffffffffffffff, 0x1c, 0x1, @in={0x2, 0x4e24, @rand_addr=0x64010101}}}, 0xa0) (async) write$P9_RSTAT(r0, &(0x7f0000000740)={0x5f, 0x7d, 0x2, {0x0, 0x58, 0xf926, 0x22, {0x80, 0x2, 0x3}, 0x102e0000, 0x93, 0x8000, 0x9, 0x9, '/dev/bsg\x00', 0xa, '!.}[:\xb0^!1\x06', 0x9, '/dev/bsg\x00', 0x9, '/dev/bsg\x00'}}, 0x5f) (async) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) (async) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000500), 0xffffffffffffffff, 0x2}}, 0x18) (async) eventfd2(0x101, 0x1) (async) [ 3582.761085][ T3898] ? percpu_counter_add_batch+0x109/0x130 [ 3582.766825][ T3898] shmem_getpage_gfp+0x8b4/0x12c0 [ 3582.771863][ T3898] ? do_user_addr_fault+0x7d4/0xb90 [ 3582.777115][ T3898] shmem_write_begin+0x7e/0x100 [ 3582.782050][ T3898] generic_perform_write+0x1c8/0x400 [ 3582.787347][ T3898] ? shmem_write_begin+0x100/0x100 [ 3582.792476][ T3898] __generic_file_write_iter+0xf7/0x2b0 [ 3582.798030][ T3898] ? generic_write_checks+0x242/0x290 [ 3582.803468][ T3898] generic_file_write_iter+0x75/0x130 [ 3582.808847][ T3898] vfs_write+0x7f5/0x950 14:44:35 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r0) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f00000000c0)={0xb, 0x10, 0xfa00, {&(0x7f0000000000), 0xffffffffffffffff, 0x1f}}, 0x18) 14:44:35 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) (async) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r0) (async) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f00000000c0)={0xb, 0x10, 0xfa00, {&(0x7f0000000000), 0xffffffffffffffff, 0x1f}}, 0x18) [ 3582.813121][ T3898] ksys_write+0xd9/0x190 [ 3582.817412][ T3898] __x64_sys_write+0x3e/0x50 [ 3582.822034][ T3898] do_syscall_64+0x44/0xd0 [ 3582.826458][ T3898] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3582.832363][ T3898] RIP: 0033:0x7f11f6e1c059 [ 3582.836782][ T3898] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 3582.839992][ T3927] FAULT_INJECTION: forcing a failure. [ 3582.839992][ T3927] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3582.856441][ T3898] RSP: 002b:00007f11f5f92168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3582.856467][ T3898] RAX: ffffffffffffffda RBX: 00007f11f6f2ef60 RCX: 00007f11f6e1c059 [ 3582.856479][ T3898] RDX: 0000000020000260 RSI: 0000000020000140 RDI: 0000000000000003 [ 3582.893823][ T3898] RBP: 00007f11f5f921d0 R08: 0000000000000000 R09: 0000000000000000 [ 3582.901785][ T3898] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3582.909740][ T3898] R13: 00007ffcf4c849ff R14: 00007f11f5f92300 R15: 0000000000022000 [ 3582.917701][ T3898] [ 3582.920706][ T3927] CPU: 0 PID: 3927 Comm: syz-executor.0 Not tainted 5.17.0-rc2-syzkaller-00167-gdcb85f85fa6f-dirty #0 [ 3582.931644][ T3927] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3582.941778][ T3927] Call Trace: [ 3582.945056][ T3927] [ 3582.948041][ T3927] dump_stack_lvl+0xd6/0x122 [ 3582.952641][ T3927] dump_stack+0x11/0x1b [ 3582.956803][ T3927] should_fail+0x23c/0x250 [ 3582.961254][ T3927] should_fail_usercopy+0x16/0x20 [ 3582.966296][ T3927] copy_page_from_iter_atomic+0x2f1/0xcd0 [ 3582.967167][ T3953] FAULT_INJECTION: forcing a failure. [ 3582.967167][ T3953] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3582.972061][ T3927] ? shmem_write_begin+0x7e/0x100 [ 3582.972090][ T3927] generic_perform_write+0x211/0x400 [ 3582.995397][ T3927] ? shmem_write_begin+0x100/0x100 [ 3583.000523][ T3927] __generic_file_write_iter+0xf7/0x2b0 [ 3583.006054][ T3927] ? generic_write_checks+0x242/0x290 [ 3583.011415][ T3927] generic_file_write_iter+0x75/0x130 [ 3583.016779][ T3927] vfs_write+0x7f5/0x950 [ 3583.021044][ T3927] ksys_write+0xd9/0x190 [ 3583.025273][ T3927] __x64_sys_write+0x3e/0x50 [ 3583.029873][ T3927] do_syscall_64+0x44/0xd0 [ 3583.034278][ T3927] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3583.040195][ T3927] RIP: 0033:0x7f9e8db3d059 [ 3583.044599][ T3927] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 3583.064196][ T3927] RSP: 002b:00007f9e8ccb3168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3583.072594][ T3927] RAX: ffffffffffffffda RBX: 00007f9e8dc4ff60 RCX: 00007f9e8db3d059 [ 3583.080567][ T3927] RDX: 0000000020000260 RSI: 0000000020000140 RDI: 0000000000000003 [ 3583.088592][ T3927] RBP: 00007f9e8ccb31d0 R08: 0000000000000000 R09: 0000000000000000 [ 3583.096555][ T3927] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3583.104509][ T3927] R13: 00007ffe952cf46f R14: 00007f9e8ccb3300 R15: 0000000000022000 14:44:36 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "e0b3772264c43c79ea3709d20d36cc4637f10fb5de2d44e0a73f520c3612063189eaba7b99fa9556bcac2ba1fb34035db66efe1e7ea748d786f601d0dcc0875cb8313c7db8b6c64b414bd5a06373bc3fbdf80ab140bf4b8f6c4a991196664cd95bbff1abeb0e982cc9b17aac4b0381a35d7a53d098e99e432a3b2f69c8b9abd7356e7cc0700ff8a36c56bf3e8a01564cd35c263749dc7c61c59645ecda836dc9f9771ff0fcdeec9e4d22cc1722bacd35e0096e747dac83ef85aed84e433e8b13e27f70ad877ff1a53934e230ed382a6c4ff7a6c1d3bb2cee4b336dcd368e29a06ed88efe1806f129bfbdfccf6c5e3ba935eb8ad0af3928b311e0a1c89eca9c75"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000100), 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) 14:44:36 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x20000260) (fail_nth: 13) 14:44:36 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x8001, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r1) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x8, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) 14:44:36 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r0) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f00000000c0)={0xb, 0x10, 0xfa00, {&(0x7f0000000000), 0xffffffffffffffff, 0x1f}}, 0x18) openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) (async) openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) (async) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r0) (async) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f00000000c0)={0xb, 0x10, 0xfa00, {&(0x7f0000000000), 0xffffffffffffffff, 0x1f}}, 0x18) (async) [ 3583.112540][ T3927] [ 3583.115546][ T3953] CPU: 1 PID: 3953 Comm: syz-executor.1 Not tainted 5.17.0-rc2-syzkaller-00167-gdcb85f85fa6f-dirty #0 [ 3583.126485][ T3953] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3583.136562][ T3953] Call Trace: [ 3583.139834][ T3953] [ 3583.142759][ T3953] dump_stack_lvl+0xd6/0x122 [ 3583.147361][ T3953] dump_stack+0x11/0x1b [ 3583.151660][ T3953] should_fail+0x23c/0x250 [ 3583.156091][ T3953] should_fail_usercopy+0x16/0x20 [ 3583.161280][ T3953] copy_page_from_iter_atomic+0x2f1/0xcd0 [ 3583.167037][ T3953] ? shmem_write_begin+0x7e/0x100 [ 3583.172066][ T3953] generic_perform_write+0x211/0x400 [ 3583.177359][ T3953] ? shmem_write_begin+0x100/0x100 [ 3583.182481][ T3953] __generic_file_write_iter+0xf7/0x2b0 [ 3583.188025][ T3953] ? generic_write_checks+0x242/0x290 [ 3583.193411][ T3953] generic_file_write_iter+0x75/0x130 [ 3583.198881][ T3953] vfs_write+0x7f5/0x950 [ 3583.203125][ T3953] ksys_write+0xd9/0x190 [ 3583.207408][ T3953] __x64_sys_write+0x3e/0x50 14:44:36 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "13bd94e32c37a3932d8ad7271907f2903ccf3bb13b387d8fdf025cdf3c8faa37a970ea456fa2fd6f8354fc3b05088269a6d5b022e392b9bd78e5e2308e054c3e2cbb6e61b42c74f3c1ba8d63d10ed85dcc5d58071547cdfd9661f05024bcf8d7722e987a76fced66d3b33373d61da648b231fe3de6f7dc9a78420b7bf0a04efb660e06f2bf671a2060d09d80f7ee6ba3ae0b6edf87d14be34012ef95719e01f065ec7943a48dcce0fcf8f7f3a89c24d940f201c7c73a3c97872a80ca25d1a3114fe16f225f4f55f3c6456cab8f0aa59d8efdc6939eb7f2b223ceff25db5222ff8e86c024229beec9ce765151d6e706fd60ab8ffe4c2e736eec4bcae53c1aaaef"}}}, 0x20000260) (fail_nth: 12) [ 3583.212102][ T3953] do_syscall_64+0x44/0xd0 [ 3583.216520][ T3953] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3583.222475][ T3953] RIP: 0033:0x7f11f6e1c059 [ 3583.226884][ T3953] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 3583.246502][ T3953] RSP: 002b:00007f11f5f92168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3583.254966][ T3953] RAX: ffffffffffffffda RBX: 00007f11f6f2ef60 RCX: 00007f11f6e1c059 14:44:36 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) 14:44:36 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f0000000280)={0x5, 0x10, 0xfa00, {&(0x7f00000002c0), 0xffffffffffffffff, 0x1}}, 0x18) 14:44:36 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x8001, 0x0) (async) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r1) (async) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x8, '\r+}', "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"}}, 0x110) (async) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) [ 3583.262940][ T3953] RDX: 0000000020000260 RSI: 0000000020000140 RDI: 0000000000000003 [ 3583.270914][ T3953] RBP: 00007f11f5f921d0 R08: 0000000000000000 R09: 0000000000000000 [ 3583.278895][ T3953] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3583.286893][ T3953] R13: 00007ffcf4c849ff R14: 00007f11f5f92300 R15: 0000000000022000 [ 3583.294870][ T3953] [ 3583.307029][ T3968] FAULT_INJECTION: forcing a failure. [ 3583.307029][ T3968] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3583.320279][ T3968] CPU: 1 PID: 3968 Comm: syz-executor.0 Not tainted 5.17.0-rc2-syzkaller-00167-gdcb85f85fa6f-dirty #0 [ 3583.331224][ T3968] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3583.341300][ T3968] Call Trace: [ 3583.344579][ T3968] [ 3583.347503][ T3968] dump_stack_lvl+0xd6/0x122 [ 3583.352098][ T3968] dump_stack+0x11/0x1b [ 3583.356258][ T3968] should_fail+0x23c/0x250 [ 3583.360800][ T3968] __alloc_pages+0x102/0x330 [ 3583.365388][ T3968] alloc_pages_vma+0x67e/0x810 [ 3583.370162][ T3968] ? percpu_counter_add_batch+0x109/0x130 [ 3583.375898][ T3968] shmem_getpage_gfp+0x8b4/0x12c0 [ 3583.381039][ T3968] ? do_user_addr_fault+0x7d4/0xb90 [ 3583.386342][ T3968] shmem_write_begin+0x7e/0x100 [ 3583.391208][ T3968] generic_perform_write+0x1c8/0x400 [ 3583.396508][ T3968] ? shmem_write_begin+0x100/0x100 [ 3583.401896][ T3968] __generic_file_write_iter+0xf7/0x2b0 [ 3583.407443][ T3968] ? generic_write_checks+0x242/0x290 [ 3583.412878][ T3968] generic_file_write_iter+0x75/0x130 [ 3583.418252][ T3968] vfs_write+0x7f5/0x950 [ 3583.422571][ T3968] ksys_write+0xd9/0x190 [ 3583.426814][ T3968] __x64_sys_write+0x3e/0x50 [ 3583.431447][ T3968] do_syscall_64+0x44/0xd0 [ 3583.436475][ T3968] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3583.442465][ T3968] RIP: 0033:0x7f9e8db3d059 [ 3583.446868][ T3968] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 3583.466483][ T3968] RSP: 002b:00007f9e8ccb3168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3583.474957][ T3968] RAX: ffffffffffffffda RBX: 00007f9e8dc4ff60 RCX: 00007f9e8db3d059 [ 3583.482962][ T3968] RDX: 0000000020000260 RSI: 0000000020000140 RDI: 0000000000000003 [ 3583.491049][ T3968] RBP: 00007f9e8ccb31d0 R08: 0000000000000000 R09: 0000000000000000 [ 3583.499146][ T3968] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3583.507224][ T3968] R13: 00007ffe952cf46f R14: 00007f9e8ccb3300 R15: 0000000000022000 [ 3583.515208][ T3968] 14:44:36 executing program 5: io_setup(0x7f, &(0x7f00000002c0)=0x0) io_cancel(r0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) io_pgetevents(r0, 0x8000, 0x2, &(0x7f0000000000)=[{}, {}], &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000180)={&(0x7f0000000140)={[0x90c0]}, 0x8}) (async, rerun: 32) io_setup(0x100, &(0x7f00000000c0)=0x0) (async, rerun: 32) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380), 0x2, 0x0) (async) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000200), 0x470080, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000001c0)={0xffffffffffffffff}, 0x106, 0x2}}, 0x20) (async) io_cancel(r1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x7, 0x1000, r2, &(0x7f00000003c0)="43c163477dc89a268bcbb8f2a047bbb69ae0c0d403c1b08f4fd6231fee7051e5bd50f596f468a42fd9b8306727a98b94086664e8b8d596dfcbb36281ae6bcc64bcfc9d75c14083cdd809cc6ea67d0ec4394ebb65497a1bd97599c52b058c99dd93156d9e67dbeb2f723c90c7182124979a58ac0a29bb345e1e544dbb087dd889c45a84c2078cf2d12e7dd6c37f7efe7169e3c98eca0f61f7014a5fa0d221a20047f972f5cc652fc74c63c4cfb2ed175e91f7c4b6", 0xb4, 0x5025d181, 0x0, 0x2, r3}, &(0x7f0000000480)) (async, rerun: 32) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), 0xffffffffffffffff) (rerun: 32) ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000300)={'syztnl2\x00', 0x0, 0x29, 0x0, 0x30, 0x80, 0xc, @private0={0xfc, 0x0, '\x00', 0x1}, @empty, 0x80, 0x10, 0x6, 0x682}}) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000280)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0, r4, 0x0, 0x3}}, 0x20) 14:44:36 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) 14:44:36 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f0000000280)={0x5, 0x10, 0xfa00, {&(0x7f00000002c0), 0xffffffffffffffff, 0x1}}, 0x18) 14:44:36 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) (async) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x8001, 0x0) (async, rerun: 32) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) (rerun: 32) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r1) (async) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x8, '\r+}', "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"}}, 0x110) (async) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) 14:44:36 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x20000260) (fail_nth: 14) 14:44:36 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x20000260) (fail_nth: 13) 14:44:36 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) 14:44:36 executing program 2: arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x6) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x7aac1, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r1) openat$cgroup_devices(r1, &(0x7f0000000280)='devices.allow\x00', 0x2, 0x0) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x1fc) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x8, 0x0, "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"}}}, 0x120) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x80, 0x0) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x8) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r2, &(0x7f0000000100)={0xb, 0x10, 0xfa00, {&(0x7f0000000040), 0xffffffffffffffff, 0x40}}, 0x18) socket$inet_udp(0x2, 0x2, 0x0) 14:44:36 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f0000000280)={0x5, 0x10, 0xfa00, {&(0x7f00000002c0), 0xffffffffffffffff, 0x1}}, 0x18) 14:44:36 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100), 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) 14:44:36 executing program 2: arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x6) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x7aac1, 0x0) (async) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r1) openat$cgroup_devices(r1, &(0x7f0000000280)='devices.allow\x00', 0x2, 0x0) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x1fc) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "e0b3772264c43c79ea3709d20d36cc4637f10fb5de2d44e0a73f520c3612063189eaba7b99fa9556bcac2ba1fb34035db66efe1e7ea748d786f601d0dcc0875cb8313c7db8b6c64b414bd5a06373bc3fbdf80ab140bf4b8f6c4a991196664cd95bbff1abeb0e982cc9b17aac4b0381a35d7a53d098e99e432a3b2f69c8b9abd7356e7cc0700ff8a36c56bf3e8a01564cd35c263749dc7c61c59645ecda836dc9f9771ff0fcdeec9e4d22cc1722bacd35e0096e747dac83ef85aed84e433e8b13e27f70ad877ff1a53934e230ed382a6c4ff7a6c1d3bb2cee4b336dcd368e29a06ed88efe1806f129bfbdfccf6c5e3ba935eb8ad0af3928b311e0a1c89eca9c75"}}, 0x110) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x8, 0x0, "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"}}}, 0x120) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x80, 0x0) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x8) (async) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r2, &(0x7f0000000100)={0xb, 0x10, 0xfa00, {&(0x7f0000000040), 0xffffffffffffffff, 0x40}}, 0x18) (async) socket$inet_udp(0x2, 0x2, 0x0) [ 3583.591297][ T3983] FAULT_INJECTION: forcing a failure. [ 3583.591297][ T3983] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3583.604386][ T3983] CPU: 1 PID: 3983 Comm: syz-executor.0 Not tainted 5.17.0-rc2-syzkaller-00167-gdcb85f85fa6f-dirty #0 [ 3583.615382][ T3983] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3583.625445][ T3983] Call Trace: [ 3583.628730][ T3983] [ 3583.631662][ T3983] dump_stack_lvl+0xd6/0x122 [ 3583.636458][ T3983] dump_stack+0x11/0x1b 14:44:36 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) [ 3583.640637][ T3983] should_fail+0x23c/0x250 [ 3583.645060][ T3983] should_fail_usercopy+0x16/0x20 [ 3583.650184][ T3983] copy_page_from_iter_atomic+0x2f1/0xcd0 [ 3583.655918][ T3983] ? shmem_write_begin+0x7e/0x100 [ 3583.660955][ T3983] generic_perform_write+0x211/0x400 [ 3583.666248][ T3983] ? shmem_write_begin+0x100/0x100 [ 3583.671376][ T3983] __generic_file_write_iter+0xf7/0x2b0 [ 3583.676924][ T3983] ? generic_write_checks+0x242/0x290 [ 3583.682331][ T3983] generic_file_write_iter+0x75/0x130 [ 3583.687863][ T3983] vfs_write+0x7f5/0x950 [ 3583.692122][ T3983] ksys_write+0xd9/0x190 [ 3583.696391][ T3983] __x64_sys_write+0x3e/0x50 [ 3583.700966][ T3983] do_syscall_64+0x44/0xd0 [ 3583.705397][ T3983] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3583.711282][ T3983] RIP: 0033:0x7f9e8db3d059 [ 3583.715684][ T3983] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 3583.735339][ T3983] RSP: 002b:00007f9e8ccb3168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3583.743749][ T3983] RAX: ffffffffffffffda RBX: 00007f9e8dc4ff60 RCX: 00007f9e8db3d059 [ 3583.751704][ T3983] RDX: 0000000020000260 RSI: 0000000020000140 RDI: 0000000000000003 [ 3583.759663][ T3983] RBP: 00007f9e8ccb31d0 R08: 0000000000000000 R09: 0000000000000000 [ 3583.767636][ T3983] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3583.775809][ T3983] R13: 00007ffe952cf46f R14: 00007f9e8ccb3300 R15: 0000000000022000 [ 3583.783839][ T3983] 14:44:36 executing program 5: io_setup(0x7f, &(0x7f00000002c0)=0x0) io_cancel(r0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) (async) io_pgetevents(r0, 0x8000, 0x2, &(0x7f0000000000)=[{}, {}], &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000180)={&(0x7f0000000140)={[0x90c0]}, 0x8}) (async) io_setup(0x100, &(0x7f00000000c0)=0x0) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380), 0x2, 0x0) (async) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000200), 0x470080, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000001c0)={0xffffffffffffffff}, 0x106, 0x2}}, 0x20) (async) io_cancel(r1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x7, 0x1000, r2, &(0x7f00000003c0)="43c163477dc89a268bcbb8f2a047bbb69ae0c0d403c1b08f4fd6231fee7051e5bd50f596f468a42fd9b8306727a98b94086664e8b8d596dfcbb36281ae6bcc64bcfc9d75c14083cdd809cc6ea67d0ec4394ebb65497a1bd97599c52b058c99dd93156d9e67dbeb2f723c90c7182124979a58ac0a29bb345e1e544dbb087dd889c45a84c2078cf2d12e7dd6c37f7efe7169e3c98eca0f61f7014a5fa0d221a20047f972f5cc652fc74c63c4cfb2ed175e91f7c4b6", 0xb4, 0x5025d181, 0x0, 0x2, r3}, &(0x7f0000000480)) (async) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), 0xffffffffffffffff) ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000300)={'syztnl2\x00', 0x0, 0x29, 0x0, 0x30, 0x80, 0xc, @private0={0xfc, 0x0, '\x00', 0x1}, @empty, 0x80, 0x10, 0x6, 0x682}}) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000280)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0, r4, 0x0, 0x3}}, 0x20) 14:44:36 executing program 2: arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x6) (async) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x7aac1, 0x0) (async) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r1) (async) openat$cgroup_devices(r1, &(0x7f0000000280)='devices.allow\x00', 0x2, 0x0) (async) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x1fc) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) (async) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x8, 0x0, "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"}}}, 0x120) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x80, 0x0) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x8) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r2, &(0x7f0000000100)={0xb, 0x10, 0xfa00, {&(0x7f0000000040), 0xffffffffffffffff, 0x40}}, 0x18) socket$inet_udp(0x2, 0x2, 0x0) 14:44:36 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x0, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) 14:44:36 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000040)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x2, 0xffffffffffffffff, 0x1c, 0x1, @ib={0x1b, 0x2, 0xffffffff, {"be1276a0043dc5882092778fc4c94acf"}, 0x7, 0x2, 0xdbc5}}}, 0xa0) 14:44:36 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x20000260) 14:44:37 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x20000260) (fail_nth: 14) 14:44:37 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) (async) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000040)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x2, 0xffffffffffffffff, 0x1c, 0x1, @ib={0x1b, 0x2, 0xffffffff, {"be1276a0043dc5882092778fc4c94acf"}, 0x7, 0x2, 0xdbc5}}}, 0xa0) 14:44:37 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) 14:44:37 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x2200, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000380)={0xf, 0x8}, 0x10) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x13f, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000740)=0x1, r4, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r4}}, 0x10) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000640)={{0x1, 0x1, 0x18, r0, {0xee01, 0xee01}}, './file0\x00'}) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r5, 0x89f6, &(0x7f0000000700)={'ip6gre0\x00', &(0x7f0000000680)={'ip6_vti0\x00', 0x0, 0x29, 0x7, 0x3, 0xfffffffb, 0x0, @mcast1, @private1={0xfc, 0x1, '\x00', 0x1}, 0x700, 0x20, 0x6, 0x7}}) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000500)={0x9, 0x108, 0xfa00, {r4, 0x1f, "137dde", "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"}}, 0x110) r6 = fsopen(&(0x7f0000000280)='affs\x00', 0x0) r7 = fsmount(r6, 0x1, 0xf1) write$RDMA_USER_CM_CMD_RESOLVE_IP(r7, &(0x7f0000000300)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x7ff, @mcast1, 0x1}, {0xa, 0x4e24, 0x2, @private1={0xfc, 0x1, '\x00', 0x81}, 0x7}, r4, 0x5}}, 0x48) [ 3583.932059][ T4037] FAULT_INJECTION: forcing a failure. [ 3583.932059][ T4037] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3583.945379][ T4037] CPU: 0 PID: 4037 Comm: syz-executor.0 Not tainted 5.17.0-rc2-syzkaller-00167-gdcb85f85fa6f-dirty #0 [ 3583.956324][ T4037] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3583.966429][ T4037] Call Trace: [ 3583.969707][ T4037] [ 3583.972634][ T4037] dump_stack_lvl+0xd6/0x122 [ 3583.977306][ T4037] dump_stack+0x11/0x1b [ 3583.981558][ T4037] should_fail+0x23c/0x250 [ 3583.985985][ T4037] __alloc_pages+0x102/0x330 [ 3583.990607][ T4037] alloc_pages_vma+0x67e/0x810 [ 3583.995382][ T4037] ? percpu_counter_add_batch+0x109/0x130 [ 3584.001107][ T4037] shmem_getpage_gfp+0x8b4/0x12c0 [ 3584.006144][ T4037] ? do_user_addr_fault+0x7d4/0xb90 [ 3584.011453][ T4037] shmem_write_begin+0x7e/0x100 [ 3584.016323][ T4037] generic_perform_write+0x1c8/0x400 [ 3584.021610][ T4037] ? shmem_write_begin+0x100/0x100 [ 3584.026734][ T4037] __generic_file_write_iter+0xf7/0x2b0 [ 3584.032358][ T4037] ? generic_write_checks+0x242/0x290 [ 3584.037801][ T4037] generic_file_write_iter+0x75/0x130 [ 3584.043177][ T4037] vfs_write+0x7f5/0x950 [ 3584.047427][ T4037] ksys_write+0xd9/0x190 [ 3584.051741][ T4037] __x64_sys_write+0x3e/0x50 [ 3584.056328][ T4037] do_syscall_64+0x44/0xd0 [ 3584.060741][ T4037] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3584.066656][ T4037] RIP: 0033:0x7f9e8db3d059 14:44:37 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000040)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x2, 0xffffffffffffffff, 0x1c, 0x1, @ib={0x1b, 0x2, 0xffffffff, {"be1276a0043dc5882092778fc4c94acf"}, 0x7, 0x2, 0xdbc5}}}, 0xa0) openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) (async) openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) (async) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000040)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x2, 0xffffffffffffffff, 0x1c, 0x1, @ib={0x1b, 0x2, 0xffffffff, {"be1276a0043dc5882092778fc4c94acf"}, 0x7, 0x2, 0xdbc5}}}, 0xa0) (async) 14:44:37 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(0xffffffffffffffff, &(0x7f0000000000)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x8}}, 0x10) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000480), 0x80bc1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000000c0)={0xffffffffffffffff}, 0x111, 0x2}}, 0x20) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r3, &(0x7f0000000300)={0x16, 0x98, 0xfa00, {&(0x7f00000001c0), 0x4, r2, 0x30, 0x0, @ib={0x1b, 0x800, 0x1, {"22190a020337558458f5244fcaddf582"}, 0x8, 0x65, 0x8}}}, 0xa0) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r4) r5 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r5) io_submit(0x0, 0x1, &(0x7f0000000240)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x2, 0x3f, r0, &(0x7f00000003c0)="7d75890a009267be1d360b6af06666f4661448c91c6a19dbb4ba88e9dcf3e6ae05f01f85c522e1226b94504fd4e741b30b3d7f998d754a55703c6a87b99fb7342e338e0bdbb2753b2a2d16ba3b7bf0bb390f80c8f04760c930b9592f9e725fe39ab0346c66b3756948eff26e63fccdce2ec705d405716999437c9a9dd84ff8944e45608f89b39fc0a54aa3299bf9f29d70f0ed7c002b889fa7237128b507b1f979", 0xa1, 0x3ff, 0x0, 0x3, r4}]) syz_genetlink_get_family_id$wireguard(&(0x7f0000000180), r1) write$RDMA_USER_CM_CMD_MIGRATE_ID(r1, &(0x7f0000000140)={0x12, 0x10, 0xfa00, {&(0x7f0000000080), r2, r3}}, 0x18) 14:44:37 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_NOTIFY(0xffffffffffffffff, &(0x7f0000000000)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x8}}, 0x10) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000480), 0x80bc1, 0x0) (async, rerun: 64) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000000c0)={0xffffffffffffffff}, 0x111, 0x2}}, 0x20) (async, rerun: 64) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r3, &(0x7f0000000300)={0x16, 0x98, 0xfa00, {&(0x7f00000001c0), 0x4, r2, 0x30, 0x0, @ib={0x1b, 0x800, 0x1, {"22190a020337558458f5244fcaddf582"}, 0x8, 0x65, 0x8}}}, 0xa0) (async) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r4) r5 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r5) io_submit(0x0, 0x1, &(0x7f0000000240)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x2, 0x3f, r0, &(0x7f00000003c0)="7d75890a009267be1d360b6af06666f4661448c91c6a19dbb4ba88e9dcf3e6ae05f01f85c522e1226b94504fd4e741b30b3d7f998d754a55703c6a87b99fb7342e338e0bdbb2753b2a2d16ba3b7bf0bb390f80c8f04760c930b9592f9e725fe39ab0346c66b3756948eff26e63fccdce2ec705d405716999437c9a9dd84ff8944e45608f89b39fc0a54aa3299bf9f29d70f0ed7c002b889fa7237128b507b1f979", 0xa1, 0x3ff, 0x0, 0x3, r4}]) (async) syz_genetlink_get_family_id$wireguard(&(0x7f0000000180), r1) (async) write$RDMA_USER_CM_CMD_MIGRATE_ID(r1, &(0x7f0000000140)={0x12, 0x10, 0xfa00, {&(0x7f0000000080), r2, r3}}, 0x18) [ 3584.071067][ T4037] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 3584.090722][ T4037] RSP: 002b:00007f9e8ccb3168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3584.099199][ T4037] RAX: ffffffffffffffda RBX: 00007f9e8dc4ff60 RCX: 00007f9e8db3d059 [ 3584.107212][ T4037] RDX: 0000000020000260 RSI: 0000000020000140 RDI: 0000000000000003 [ 3584.115166][ T4037] RBP: 00007f9e8ccb31d0 R08: 0000000000000000 R09: 0000000000000000 [ 3584.123117][ T4037] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 14:44:37 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r1 = io_uring_setup(0x6c5d, &(0x7f0000000000)={0x0, 0xa05e, 0x10, 0x2, 0x3d3}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000008, 0x4030, r1, 0x8000000) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000280)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0, r2, 0x0, 0x3}}, 0x20) 14:44:37 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_NOTIFY(0xffffffffffffffff, &(0x7f0000000000)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x8}}, 0x10) (async) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000480), 0x80bc1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000000c0)={0xffffffffffffffff}, 0x111, 0x2}}, 0x20) (async, rerun: 64) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) (rerun: 64) write$RDMA_USER_CM_CMD_JOIN_MCAST(r3, &(0x7f0000000300)={0x16, 0x98, 0xfa00, {&(0x7f00000001c0), 0x4, r2, 0x30, 0x0, @ib={0x1b, 0x800, 0x1, {"22190a020337558458f5244fcaddf582"}, 0x8, 0x65, 0x8}}}, 0xa0) (async) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r4) r5 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r5) io_submit(0x0, 0x1, &(0x7f0000000240)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x2, 0x3f, r0, &(0x7f00000003c0)="7d75890a009267be1d360b6af06666f4661448c91c6a19dbb4ba88e9dcf3e6ae05f01f85c522e1226b94504fd4e741b30b3d7f998d754a55703c6a87b99fb7342e338e0bdbb2753b2a2d16ba3b7bf0bb390f80c8f04760c930b9592f9e725fe39ab0346c66b3756948eff26e63fccdce2ec705d405716999437c9a9dd84ff8944e45608f89b39fc0a54aa3299bf9f29d70f0ed7c002b889fa7237128b507b1f979", 0xa1, 0x3ff, 0x0, 0x3, r4}]) (async) syz_genetlink_get_family_id$wireguard(&(0x7f0000000180), r1) (async, rerun: 64) write$RDMA_USER_CM_CMD_MIGRATE_ID(r1, &(0x7f0000000140)={0x12, 0x10, 0xfa00, {&(0x7f0000000080), r2, r3}}, 0x18) (rerun: 64) 14:44:37 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) 14:44:37 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0xf, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x20000260) 14:44:37 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) (async) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x2200, 0x0) (async) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000380)={0xf, 0x8}, 0x10) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x13f, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000740)=0x1, r4, 0x0, 0x1, 0x4}}, 0x20) (async) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r4}}, 0x10) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000640)={{0x1, 0x1, 0x18, r0, {0xee01, 0xee01}}, './file0\x00'}) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r5, 0x89f6, &(0x7f0000000700)={'ip6gre0\x00', &(0x7f0000000680)={'ip6_vti0\x00', 0x0, 0x29, 0x7, 0x3, 0xfffffffb, 0x0, @mcast1, @private1={0xfc, 0x1, '\x00', 0x1}, 0x700, 0x20, 0x6, 0x7}}) (async) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000500)={0x9, 0x108, 0xfa00, {r4, 0x1f, "137dde", "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"}}, 0x110) r6 = fsopen(&(0x7f0000000280)='affs\x00', 0x0) r7 = fsmount(r6, 0x1, 0xf1) write$RDMA_USER_CM_CMD_RESOLVE_IP(r7, &(0x7f0000000300)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x7ff, @mcast1, 0x1}, {0xa, 0x4e24, 0x2, @private1={0xfc, 0x1, '\x00', 0x81}, 0x7}, r4, 0x5}}, 0x48) 14:44:37 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "13bd94e32c37a3932d8ad7271907f2903ccf3bb13b387d8fdf025cdf3c8faa37a970ea456fa2fd6f8354fc3b05088269a6d5b022e392b9bd78e5e2308e054c3e2cbb6e61b42c74f3c1ba8d63d10ed85dcc5d58071547cdfd9661f05024bcf8d7722e987a76fced66d3b33373d61da648b231fe3de6f7dc9a78420b7bf0a04efb660e06f2bf671a2060d09d80f7ee6ba3ae0b6edf87d14be34012ef95719e01f065ec7943a48dcce0fcf8f7f3a89c24d940f201c7c73a3c97872a80ca25d1a3114fe16f225f4f55f3c6456cab8f0aa59d8efdc6939eb7f2b223ceff25db5222ff8e86c024229beec9ce765151d6e706fd60ab8ffe4c2e736eec4bcae53c1aaaef"}}}, 0x20000260) (fail_nth: 15) 14:44:37 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r1 = io_uring_setup(0x6c5d, &(0x7f0000000000)={0x0, 0xa05e, 0x10, 0x2, 0x3d3}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000008, 0x4030, r1, 0x8000000) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000280)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0, r2, 0x0, 0x3}}, 0x20) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) (async) io_uring_setup(0x6c5d, &(0x7f0000000000)={0x0, 0xa05e, 0x10, 0x2, 0x3d3}) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x2}}, 0x20) (async) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000008, 0x4030, r1, 0x8000000) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000280)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0, r2, 0x0, 0x3}}, 0x20) (async) [ 3584.131134][ T4037] R13: 00007ffe952cf46f R14: 00007f9e8ccb3300 R15: 0000000000022000 [ 3584.139253][ T4037] [ 3584.168858][ T4060] FAULT_INJECTION: forcing a failure. [ 3584.168858][ T4060] name fail_usercopy, interval 1, probability 0, space 0, times 0 14:44:37 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r1 = io_uring_setup(0x6c5d, &(0x7f0000000000)={0x0, 0xa05e, 0x10, 0x2, 0x3d3}) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000008, 0x4030, r1, 0x8000000) (async, rerun: 32) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000280)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0, r2, 0x0, 0x3}}, 0x20) (rerun: 32) 14:44:37 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) (async) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x2200, 0x0) (async) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000380)={0xf, 0x8}, 0x10) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x13f, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000740)=0x1, r4, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r4}}, 0x10) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000640)={{0x1, 0x1, 0x18, r0, {0xee01, 0xee01}}, './file0\x00'}) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r5, 0x89f6, &(0x7f0000000700)={'ip6gre0\x00', &(0x7f0000000680)={'ip6_vti0\x00', 0x0, 0x29, 0x7, 0x3, 0xfffffffb, 0x0, @mcast1, @private1={0xfc, 0x1, '\x00', 0x1}, 0x700, 0x20, 0x6, 0x7}}) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000500)={0x9, 0x108, 0xfa00, {r4, 0x1f, "137dde", "1c4fcac63eb49494dcf625e19b16a748aa720e6b278cfe4f65daa1161561ccd166aec94ac65ca087af50a3a56188835fae3e6814f38c25a606268d1fe36fd0b0a82bc2c789699ab4eba79332cb249056f50700f324d7323a052742f8f58e99c3fcf681dd9d67131341388d1ee8048bef222f2124dcccd3267db0863b38a264d311c2837232ff2304471f83b8766f5eac5c7477be762a2d1d1ff0dc075088f689f88bbe221b7568ea61afa86f1b73d50d63f058b0e61bf0efcce4061394801fb5a11443e3df6af75951b04981c177dc9d7c5d6e11445c679e47c7635dea3c69a700e3fe9fa65e26ee562a513d387e5d4c3a1261f6e21a8d5c33822c57318f8ebb"}}, 0x110) (async) r6 = fsopen(&(0x7f0000000280)='affs\x00', 0x0) r7 = fsmount(r6, 0x1, 0xf1) write$RDMA_USER_CM_CMD_RESOLVE_IP(r7, &(0x7f0000000300)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x7ff, @mcast1, 0x1}, {0xa, 0x4e24, 0x2, @private1={0xfc, 0x1, '\x00', 0x81}, 0x7}, r4, 0x5}}, 0x48) [ 3584.182045][ T4060] CPU: 0 PID: 4060 Comm: syz-executor.0 Not tainted 5.17.0-rc2-syzkaller-00167-gdcb85f85fa6f-dirty #0 [ 3584.193034][ T4060] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3584.203138][ T4060] Call Trace: [ 3584.206416][ T4060] [ 3584.209352][ T4060] dump_stack_lvl+0xd6/0x122 [ 3584.214175][ T4060] dump_stack+0x11/0x1b [ 3584.218410][ T4060] should_fail+0x23c/0x250 [ 3584.222832][ T4060] should_fail_usercopy+0x16/0x20 [ 3584.227868][ T4060] copy_page_from_iter_atomic+0x2f1/0xcd0 14:44:37 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x0, 0x0, '\x00', [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, 0xd) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) 14:44:37 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) 14:44:37 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "e0b3772264c43c79ea3709d20d36cc4637f10fb5de2d44e0a73f520c3612063189eaba7b99fa9556bcac2ba1fb34035db66efe1e7ea748d786f601d0dcc0875cb8313c7db8b6c64b414bd5a06373bc3fbdf80ab140bf4b8f6c4a991196664cd95bbff1abeb0e982cc9b17aac4b0381a35d7a53d098e99e432a3b2f69c8b9abd7356e7cc0700ff8a36c56bf3e8a01564cd35c263749dc7c61c59645ecda836dc9f9771ff0fcdeec9e4d22cc1722bacd35e0096e747dac83ef85aed84e433e8b13e27f70ad877ff1a53934e230ed382a6c4ff7a6c1d3bb2cee4b336dcd368e29a06ed88efe1806f129bfbdfccf6c5e3ba935eb8ad0af3928b311e0a1c89eca9c75"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) [ 3584.233651][ T4060] ? shmem_write_begin+0x7e/0x100 [ 3584.238683][ T4060] generic_perform_write+0x211/0x400 [ 3584.244048][ T4060] ? shmem_write_begin+0x100/0x100 [ 3584.249172][ T4060] __generic_file_write_iter+0xf7/0x2b0 [ 3584.254729][ T4060] ? generic_write_checks+0x242/0x290 [ 3584.260109][ T4060] generic_file_write_iter+0x75/0x130 [ 3584.265493][ T4060] vfs_write+0x7f5/0x950 [ 3584.269749][ T4060] ksys_write+0xd9/0x190 [ 3584.274175][ T4060] __x64_sys_write+0x3e/0x50 [ 3584.278771][ T4060] do_syscall_64+0x44/0xd0 [ 3584.283197][ T4060] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3584.289137][ T4060] RIP: 0033:0x7f9e8db3d059 [ 3584.293557][ T4060] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 3584.313167][ T4060] RSP: 002b:00007f9e8ccb3168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3584.321688][ T4060] RAX: ffffffffffffffda RBX: 00007f9e8dc4ff60 RCX: 00007f9e8db3d059 14:44:37 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x0, 0x0, '\x00', [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, 0xd) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) (async) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) 14:44:37 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000), 0x2, 0x1}}, 0x20) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) 14:44:37 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, 0x0, 0x0) [ 3584.329664][ T4060] RDX: 0000000020000260 RSI: 0000000020000140 RDI: 0000000000000003 [ 3584.337632][ T4060] RBP: 00007f9e8ccb31d0 R08: 0000000000000000 R09: 0000000000000000 [ 3584.345677][ T4060] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3584.353646][ T4060] R13: 00007ffe952cf46f R14: 00007f9e8ccb3300 R15: 0000000000022000 [ 3584.361629][ T4060] 14:44:37 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa02, {{0x0, 0x0, "13bd94e32c37a3932d8ad7271907f2903ccf3bb13b387d8fdf025cdf3c8faa37a970ea456fa2fd6f8354fc3b05088269a6d5b022e392b9bd78e5e2308e054c3e2cbb6e61b42c74f3c1ba8d63d10ed85dcc5d58071547cdfd9661f05024bcf8d7722e987a76fced66d3b33373d61da648b231fe3de6f7dc9a78420b7bf0a04efb660e06f2bf671a2060d09d80f7ee6ba3ae0b6edf87d14be34012ef95719e01f065ec7943a48dcce0fcf8f7f3a89c24d940f201c7c73a3c97872a80ca25d1a3114fe16f225f4f55f3c6456cab8f0aa59d8efdc6939eb7f2b223ceff25db5222ff8e86c024229beec9ce765151d6e706fd60ab8ffe4c2e736eec4bcae53c1aaaef"}}}, 0x20000260) 14:44:37 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x0, 0x0, '\x00', [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, 0xd) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "e0b3772264c43c79ea3709d20d36cc4637f10fb5de2d44e0a73f520c3612063189eaba7b99fa9556bcac2ba1fb34035db66efe1e7ea748d786f601d0dcc0875cb8313c7db8b6c64b414bd5a06373bc3fbdf80ab140bf4b8f6c4a991196664cd95bbff1abeb0e982cc9b17aac4b0381a35d7a53d098e99e432a3b2f69c8b9abd7356e7cc0700ff8a36c56bf3e8a01564cd35c263749dc7c61c59645ecda836dc9f9771ff0fcdeec9e4d22cc1722bacd35e0096e747dac83ef85aed84e433e8b13e27f70ad877ff1a53934e230ed382a6c4ff7a6c1d3bb2cee4b336dcd368e29a06ed88efe1806f129bfbdfccf6c5e3ba935eb8ad0af3928b311e0a1c89eca9c75"}}, 0x110) (async) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) 14:44:37 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x20000260) (fail_nth: 16) 14:44:37 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x2}}, 0x20) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r3}}, 0x10) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000280)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000000)=0x1, r3, 0x0, 0x2, 0x4}}, 0x20) 14:44:37 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000), 0x2, 0x1}}, 0x20) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000), 0x2, 0x1}}, 0x20) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) 14:44:37 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, 0x0, 0x0) 14:44:37 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x452281, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r6, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r7}}, 0x10) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r4, &(0x7f0000000480)={0xb, 0x10, 0xfa00, {&(0x7f00000003c0), r7, 0x5591}}, 0x18) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r3}}, 0x10) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000280)={0x9, 0x108, 0xfa00, {r3, 0x0, '\x00', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "13bd94e32c37a3932d8ad7271907f2903ccf3bb13b387d8fdf025cdf3c8faa37a970ea456fa2fd6f8354fc3b05088269a6d5b022e392b9bd78e5e2308e054c3e2cbb6e61b42c74f3c1ba8d63d10ed85dcc5d58071547cdfd9661f05024bcf8d7722e987a76fced66d3b33373d61da648b231fe3de6f7dc9a78420b7bf0a04efb660e06f2bf671a2060d09d80f7ee6ba3ae0b6edf87d14be34012ef95719e01f065ec7943a48dcce0fcf8f7f3a89c24d940f201c7c73a3c97872a80ca25d1a3114fe16f225f4f55f3c6456cab8f0aa59d8efdc6939eb7f2b223ceff25db5222ff8e86c024229beec9ce765151d6e706fd60ab8ffe4c2e736eec4bcae53c1aaaef"}}}, 0x120) 14:44:37 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x2}}, 0x20) (async) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r3}}, 0x10) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000280)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000000)=0x1, r3, 0x0, 0x2, 0x4}}, 0x20) 14:44:37 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, 0x0, 0x0) 14:44:37 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000), 0x2, 0x1}}, 0x20) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000), 0x2, 0x1}}, 0x20) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) 14:44:37 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x452281, 0x0) (async) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r4) (async) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r6, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r7}}, 0x10) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r4, &(0x7f0000000480)={0xb, 0x10, 0xfa00, {&(0x7f00000003c0), r7, 0x5591}}, 0x18) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r3}}, 0x10) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000280)={0x9, 0x108, 0xfa00, {r3, 0x0, '\x00', "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"}}, 0x110) (async) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) 14:44:37 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000240)={0xffffffffffffffff}, 0x111, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000002c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000040), r1, 0x1}}, 0x18) [ 3584.574800][ T4113] FAULT_INJECTION: forcing a failure. [ 3584.574800][ T4113] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3584.588179][ T4113] CPU: 1 PID: 4113 Comm: syz-executor.0 Not tainted 5.17.0-rc2-syzkaller-00167-gdcb85f85fa6f-dirty #0 [ 3584.599121][ T4113] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3584.609182][ T4113] Call Trace: [ 3584.612464][ T4113] [ 3584.615393][ T4113] dump_stack_lvl+0xd6/0x122 [ 3584.620056][ T4113] dump_stack+0x11/0x1b 14:44:37 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa03, {{0x0, 0x0, "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"}}}, 0x20000260) 14:44:37 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x2}}, 0x20) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r3}}, 0x10) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000280)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000000)=0x1, r3, 0x0, 0x2, 0x4}}, 0x20) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x2}}, 0x20) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r3}}, 0x10) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000280)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000000)=0x1, r3, 0x0, 0x2, 0x4}}, 0x20) (async) [ 3584.624211][ T4113] should_fail+0x23c/0x250 [ 3584.628667][ T4113] __alloc_pages+0x102/0x330 [ 3584.633259][ T4113] alloc_pages_vma+0x67e/0x810 [ 3584.638034][ T4113] ? percpu_counter_add_batch+0x109/0x130 [ 3584.643798][ T4113] shmem_getpage_gfp+0x8b4/0x12c0 [ 3584.648833][ T4113] ? do_user_addr_fault+0x7d4/0xb90 [ 3584.654138][ T4113] shmem_write_begin+0x7e/0x100 [ 3584.659019][ T4113] generic_perform_write+0x1c8/0x400 [ 3584.664430][ T4113] ? shmem_write_begin+0x100/0x100 [ 3584.669637][ T4113] __generic_file_write_iter+0xf7/0x2b0 [ 3584.675219][ T4113] ? generic_write_checks+0x242/0x290 [ 3584.680597][ T4113] generic_file_write_iter+0x75/0x130 [ 3584.685974][ T4113] vfs_write+0x7f5/0x950 [ 3584.690232][ T4113] ksys_write+0xd9/0x190 [ 3584.694477][ T4113] __x64_sys_write+0x3e/0x50 [ 3584.699081][ T4113] do_syscall_64+0x44/0xd0 [ 3584.703542][ T4113] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3584.709535][ T4113] RIP: 0033:0x7f9e8db3d059 [ 3584.713955][ T4113] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 3584.733570][ T4113] RSP: 002b:00007f9e8ccb3168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3584.741998][ T4113] RAX: ffffffffffffffda RBX: 00007f9e8dc4ff60 RCX: 00007f9e8db3d059 [ 3584.749973][ T4113] RDX: 0000000020000260 RSI: 0000000020000140 RDI: 0000000000000003 [ 3584.757941][ T4113] RBP: 00007f9e8ccb31d0 R08: 0000000000000000 R09: 0000000000000000 [ 3584.765923][ T4113] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 14:44:37 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x20000260) (fail_nth: 17) 14:44:37 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000240)={0xffffffffffffffff}, 0x111, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000002c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000040), r1, 0x1}}, 0x18) openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) (async) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000240), 0x111, 0x1}}, 0x20) (async) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000002c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000040), r1, 0x1}}, 0x18) (async) 14:44:37 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "e0b3772264c43c79ea3709d20d36cc4637f10fb5de2d44e0a73f520c3612063189eaba7b99fa9556bcac2ba1fb34035db66efe1e7ea748d786f601d0dcc0875cb8313c7db8b6c64b414bd5a06373bc3fbdf80ab140bf4b8f6c4a991196664cd95bbff1abeb0e982cc9b17aac4b0381a35d7a53d098e99e432a3b2f69c8b9abd7356e7cc0700ff8a36c56bf3e8a01564cd35c263749dc7c61c59645ecda836dc9f9771ff0fcdeec9e4d22cc1722bacd35e0096e747dac83ef85aed84e433e8b13e27f70ad877ff1a53934e230ed382a6c4ff7a6c1d3bb2cee4b336dcd368e29a06ed88efe1806f129bfbdfccf6c5e3ba935eb8ad0af3928b311e0a1c89eca9c75"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) (fail_nth: 1) 14:44:37 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa04, {{0x0, 0x0, "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"}}}, 0x20000260) 14:44:37 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x452281, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) (async) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r4) (async) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r6, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r7}}, 0x10) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r4, &(0x7f0000000480)={0xb, 0x10, 0xfa00, {&(0x7f00000003c0), r7, 0x5591}}, 0x18) (async) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r3}}, 0x10) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000280)={0x9, 0x108, 0xfa00, {r3, 0x0, '\x00', "e0b3772264c43c79ea3709d20d36cc4637f10fb5de2d44e0a73f520c3612063189eaba7b99fa9556bcac2ba1fb34035db66efe1e7ea748d786f601d0dcc0875cb8313c7db8b6c64b414bd5a06373bc3fbdf80ab140bf4b8f6c4a991196664cd95bbff1abeb0e982cc9b17aac4b0381a35d7a53d098e99e432a3b2f69c8b9abd7356e7cc0700ff8a36c56bf3e8a01564cd35c263749dc7c61c59645ecda836dc9f9771ff0fcdeec9e4d22cc1722bacd35e0096e747dac83ef85aed84e433e8b13e27f70ad877ff1a53934e230ed382a6c4ff7a6c1d3bb2cee4b336dcd368e29a06ed88efe1806f129bfbdfccf6c5e3ba935eb8ad0af3928b311e0a1c89eca9c75"}}, 0x110) (async) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) 14:44:37 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x351940, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) r4 = syz_genetlink_get_family_id$devlink(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RATE_GET(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x64, r4, 0x100, 0x70bd2b, 0x25dfdbff, {}, [@handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_RATE_NODE_NAME={0xe}, @handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}]}, 0x64}, 0x1, 0x0, 0x0, 0x24048084}, 0x0) sendmsg$DEVLINK_CMD_PORT_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)=ANY=[@ANYBLOB='d\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="ff042cbd7000fddbdf25050000000e0001006e657464657673696d0010000f0002006e657464657673696d30000008000300000000000e0001006e657464657673696d0000000f0002006e657464657673696d3000080000030003000000"], 0x64}, 0x1, 0x0, 0x0, 0xee2f80695921b68c}, 0x8800) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r3}}, 0x10) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000000)={0xf, 0x8, 0xfa00, {r3, 0x2}}, 0x10) r5 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r5) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, &(0x7f00000001c0)={0x11, 0x10, 0xfa00, {&(0x7f0000000180)}}, 0x18) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r5, &(0x7f00000004c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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", @ANYRES16=0x0, @ANYBLOB="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"], 0x124}, 0x1, 0x0, 0x0, 0x800}, 0x8004) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000500), 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000300)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0, r7, 0x0, 0x3}}, 0x20) [ 3584.773896][ T4113] R13: 00007ffe952cf46f R14: 00007f9e8ccb3300 R15: 0000000000022000 [ 3584.781872][ T4113] [ 3584.813184][ T4141] FAULT_INJECTION: forcing a failure. [ 3584.813184][ T4141] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3584.815719][ T4152] FAULT_INJECTION: forcing a failure. [ 3584.815719][ T4152] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3584.826419][ T4141] CPU: 0 PID: 4141 Comm: syz-executor.3 Not tainted 5.17.0-rc2-syzkaller-00167-gdcb85f85fa6f-dirty #0 [ 3584.850340][ T4141] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3584.860401][ T4141] Call Trace: [ 3584.863723][ T4141] [ 3584.866701][ T4141] dump_stack_lvl+0xd6/0x122 [ 3584.871339][ T4141] dump_stack+0x11/0x1b [ 3584.875489][ T4141] should_fail+0x23c/0x250 [ 3584.879941][ T4141] should_fail_usercopy+0x16/0x20 [ 3584.884955][ T4141] copy_page_from_iter_atomic+0x2f1/0xcd0 [ 3584.890670][ T4141] ? shmem_write_begin+0x7e/0x100 [ 3584.895690][ T4141] generic_perform_write+0x211/0x400 [ 3584.901013][ T4141] ? current_time+0xed/0x1a0 [ 3584.905666][ T4141] __generic_file_write_iter+0xf7/0x2b0 [ 3584.911216][ T4141] ? generic_write_checks+0x250/0x290 [ 3584.916600][ T4141] generic_file_write_iter+0x75/0x130 [ 3584.921961][ T4141] vfs_write+0x7f5/0x950 [ 3584.926271][ T4141] ksys_write+0xd9/0x190 [ 3584.930502][ T4141] __x64_sys_write+0x3e/0x50 [ 3584.935428][ T4141] do_syscall_64+0x44/0xd0 [ 3584.939888][ T4141] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3584.945816][ T4141] RIP: 0033:0x7faccc840059 [ 3584.950217][ T4141] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 14:44:38 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000240)={0xffffffffffffffff}, 0x111, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000002c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000040), r1, 0x1}}, 0x18) openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) (async) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000240), 0x111, 0x1}}, 0x20) (async) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000002c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000040), r1, 0x1}}, 0x18) (async) [ 3584.969843][ T4141] RSP: 002b:00007faccb9b6168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3584.978244][ T4141] RAX: ffffffffffffffda RBX: 00007faccc952f60 RCX: 00007faccc840059 [ 3584.986205][ T4141] RDX: 0000000000000120 RSI: 0000000020000140 RDI: 0000000000000003 [ 3584.994158][ T4141] RBP: 00007faccb9b61d0 R08: 0000000000000000 R09: 0000000000000000 [ 3585.002187][ T4141] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3585.010147][ T4141] R13: 00007ffd5799c6bf R14: 00007faccb9b6300 R15: 0000000000022000 [ 3585.018181][ T4141] 14:44:38 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) [ 3585.021188][ T4152] CPU: 1 PID: 4152 Comm: syz-executor.0 Not tainted 5.17.0-rc2-syzkaller-00167-gdcb85f85fa6f-dirty #0 [ 3585.032206][ T4152] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3585.042326][ T4152] Call Trace: [ 3585.045608][ T4152] [ 3585.048539][ T4152] dump_stack_lvl+0xd6/0x122 [ 3585.053207][ T4152] dump_stack+0x11/0x1b [ 3585.057452][ T4152] should_fail+0x23c/0x250 [ 3585.061914][ T4152] should_fail_usercopy+0x16/0x20 [ 3585.066980][ T4152] copy_page_from_iter_atomic+0x2f1/0xcd0 14:44:38 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) [ 3585.072784][ T4152] ? shmem_write_begin+0x7e/0x100 [ 3585.077851][ T4152] generic_perform_write+0x211/0x400 [ 3585.083144][ T4152] ? shmem_write_begin+0x100/0x100 [ 3585.088284][ T4152] __generic_file_write_iter+0xf7/0x2b0 [ 3585.093883][ T4152] ? generic_write_checks+0x242/0x290 [ 3585.099343][ T4152] generic_file_write_iter+0x75/0x130 [ 3585.104719][ T4152] vfs_write+0x7f5/0x950 [ 3585.108970][ T4152] ksys_write+0xd9/0x190 [ 3585.113213][ T4152] __x64_sys_write+0x3e/0x50 [ 3585.117811][ T4152] do_syscall_64+0x44/0xd0 14:44:38 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "13bd94e32c37a3932d8ad7271907f2903ccf3bb13b387d8fdf025cdf3c8faa37a970ea456fa2fd6f8354fc3b05088269a6d5b022e392b9bd78e5e2308e054c3e2cbb6e61b42c74f3c1ba8d63d10ed85dcc5d58071547cdfd9661f05024bcf8d7722e987a76fced66d3b33373d61da648b231fe3de6f7dc9a78420b7bf0a04efb660e06f2bf671a2060d09d80f7ee6ba3ae0b6edf87d14be34012ef95719e01f065ec7943a48dcce0fcf8f7f3a89c24d940f201c7c73a3c97872a80ca25d1a3114fe16f225f4f55f3c6456cab8f0aa59d8efdc6939eb7f2b223ceff25db5222ff8e86c024229beec9ce765151d6e706fd60ab8ffe4c2e736eec4bcae53c1aaaef"}}}, 0x120) (fail_nth: 2) [ 3585.122343][ T4152] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3585.128252][ T4152] RIP: 0033:0x7f9e8db3d059 [ 3585.132660][ T4152] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 3585.152353][ T4152] RSP: 002b:00007f9e8ccb3168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3585.160773][ T4152] RAX: ffffffffffffffda RBX: 00007f9e8dc4ff60 RCX: 00007f9e8db3d059 [ 3585.168746][ T4152] RDX: 0000000020000260 RSI: 0000000020000140 RDI: 0000000000000003 [ 3585.172487][ T4164] FAULT_INJECTION: forcing a failure. [ 3585.172487][ T4164] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3585.176718][ T4152] RBP: 00007f9e8ccb31d0 R08: 0000000000000000 R09: 0000000000000000 [ 3585.197736][ T4152] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3585.205704][ T4152] R13: 00007ffe952cf46f R14: 00007f9e8ccb3300 R15: 0000000000022000 [ 3585.213668][ T4152] [ 3585.216673][ T4164] CPU: 0 PID: 4164 Comm: syz-executor.3 Not tainted 5.17.0-rc2-syzkaller-00167-gdcb85f85fa6f-dirty #0 [ 3585.227616][ T4164] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3585.237672][ T4164] Call Trace: [ 3585.240957][ T4164] [ 3585.243957][ T4164] dump_stack_lvl+0xd6/0x122 [ 3585.248555][ T4164] dump_stack+0x11/0x1b [ 3585.252723][ T4164] should_fail+0x23c/0x250 [ 3585.257233][ T4164] should_fail_usercopy+0x16/0x20 [ 3585.262259][ T4164] _copy_to_user+0x1c/0x90 [ 3585.266680][ T4164] simple_read_from_buffer+0xab/0x120 [ 3585.272053][ T4164] proc_fail_nth_read+0x10d/0x150 [ 3585.277131][ T4164] ? proc_fault_inject_write+0x230/0x230 [ 3585.282807][ T4164] vfs_read+0x1e6/0x750 [ 3585.286966][ T4164] ? __fget_files+0x1d2/0x210 [ 3585.291643][ T4164] ksys_read+0xd9/0x190 [ 3585.295798][ T4164] __x64_sys_read+0x3e/0x50 [ 3585.300339][ T4164] do_syscall_64+0x44/0xd0 [ 3585.304838][ T4164] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3585.310735][ T4164] RIP: 0033:0x7faccc7f2c0c [ 3585.315147][ T4164] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 3585.334781][ T4164] RSP: 002b:00007faccb9b6160 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 3585.343335][ T4164] RAX: ffffffffffffffda RBX: 00007faccc952f60 RCX: 00007faccc7f2c0c [ 3585.351305][ T4164] RDX: 000000000000000f RSI: 00007faccb9b61e0 RDI: 0000000000000004 [ 3585.359360][ T4164] RBP: 00007faccb9b61d0 R08: 0000000000000000 R09: 0000000000000000 [ 3585.367367][ T4164] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 14:44:38 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x20000260) (fail_nth: 18) 14:44:38 executing program 2: write$RDMA_USER_CM_CMD_REJECT(0xffffffffffffffff, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "e0b3772264c43c79ea3709d20d36cc4637f10fb5de2d44e0a73f520c3612063189eaba7b99fa9556bcac2ba1fb34035db66efe1e7ea748d786f601d0dcc0875cb8313c7db8b6c64b414bd5a06373bc3fbdf80ab140bf4b8f6c4a991196664cd95bbff1abeb0e982cc9b17aac4b0381a35d7a53d098e99e432a3b2f69c8b9abd7356e7cc0700ff8a36c56bf3e8a01564cd35c263749dc7c61c59645ecda836dc9f9771ff0fcdeec9e4d22cc1722bacd35e0096e747dac83ef85aed84e433e8b13e27f70ad877ff1a53934e230ed382a6c4ff7a6c1d3bb2cee4b336dcd368e29a06ed88efe1806f129bfbdfccf6c5e3ba935eb8ad0af3928b311e0a1c89eca9c75"}}, 0x110) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "13bd94e32c37a3932d8ad7271907f2903ccf3bb13b387d8fdf025cdf3c8faa37a970ea456fa2fd6f8354fc3b05088269a6d5b022e392b9bd78e5e2308e054c3e2cbb6e61b42c74f3c1ba8d63d10ed85dcc5d58071547cdfd9661f05024bcf8d7722e987a76fced66d3b33373d61da648b231fe3de6f7dc9a78420b7bf0a04efb660e06f2bf671a2060d09d80f7ee6ba3ae0b6edf87d14be34012ef95719e01f065ec7943a48dcce0fcf8f7f3a89c24d940f201c7c73a3c97872a80ca25d1a3114fe16f225f4f55f3c6456cab8f0aa59d8efdc6939eb7f2b223ceff25db5222ff8e86c024229beec9ce765151d6e706fd60ab8ffe4c2e736eec4bcae53c1aaaef"}}}, 0x120) 14:44:38 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 14:44:38 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x351940, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r0) (async) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) (async) r4 = syz_genetlink_get_family_id$devlink(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RATE_GET(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x64, r4, 0x100, 0x70bd2b, 0x25dfdbff, {}, [@handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_RATE_NODE_NAME={0xe}, @handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}]}, 0x64}, 0x1, 0x0, 0x0, 0x24048084}, 0x0) (async) sendmsg$DEVLINK_CMD_PORT_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)=ANY=[@ANYBLOB='d\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="ff042cbd7000fddbdf25050000000e0001006e657464657673696d0010000f0002006e657464657673696d30000008000300000000000e0001006e657464657673696d0000000f0002006e657464657673696d3000080000030003000000"], 0x64}, 0x1, 0x0, 0x0, 0xee2f80695921b68c}, 0x8800) (async) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r3}}, 0x10) (async) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000000)={0xf, 0x8, 0xfa00, {r3, 0x2}}, 0x10) (async) r5 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r5) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, &(0x7f00000001c0)={0x11, 0x10, 0xfa00, {&(0x7f0000000180)}}, 0x18) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) (async) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r5, &(0x7f00000004c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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", @ANYRES16=0x0, @ANYBLOB="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"], 0x124}, 0x1, 0x0, 0x0, 0x800}, 0x8004) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000500), 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000300)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0, r7, 0x0, 0x3}}, 0x20) [ 3585.375406][ T4164] R13: 00007ffd5799c6bf R14: 00007faccb9b6300 R15: 0000000000022000 [ 3585.383456][ T4164] [ 3585.403617][ T4172] FAULT_INJECTION: forcing a failure. [ 3585.403617][ T4172] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3585.416930][ T4172] CPU: 0 PID: 4172 Comm: syz-executor.0 Not tainted 5.17.0-rc2-syzkaller-00167-gdcb85f85fa6f-dirty #0 [ 3585.427913][ T4172] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3585.437971][ T4172] Call Trace: [ 3585.441331][ T4172] [ 3585.444261][ T4172] dump_stack_lvl+0xd6/0x122 [ 3585.449052][ T4172] dump_stack+0x11/0x1b [ 3585.453356][ T4172] should_fail+0x23c/0x250 [ 3585.457782][ T4172] __alloc_pages+0x102/0x330 [ 3585.462375][ T4172] alloc_pages_vma+0x67e/0x810 [ 3585.467141][ T4172] ? percpu_counter_add_batch+0x109/0x130 [ 3585.472867][ T4172] shmem_getpage_gfp+0x8b4/0x12c0 [ 3585.477913][ T4172] ? do_user_addr_fault+0x7d4/0xb90 [ 3585.483126][ T4172] shmem_write_begin+0x7e/0x100 [ 3585.487985][ T4172] generic_perform_write+0x1c8/0x400 [ 3585.493388][ T4172] ? shmem_write_begin+0x100/0x100 [ 3585.498585][ T4172] __generic_file_write_iter+0xf7/0x2b0 [ 3585.504239][ T4172] ? generic_write_checks+0x242/0x290 [ 3585.509621][ T4172] generic_file_write_iter+0x75/0x130 [ 3585.514999][ T4172] vfs_write+0x7f5/0x950 [ 3585.519256][ T4172] ksys_write+0xd9/0x190 [ 3585.523507][ T4172] __x64_sys_write+0x3e/0x50 [ 3585.528172][ T4172] do_syscall_64+0x44/0xd0 [ 3585.532637][ T4172] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3585.538545][ T4172] RIP: 0033:0x7f9e8db3d059 [ 3585.542965][ T4172] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 3585.563019][ T4172] RSP: 002b:00007f9e8ccb3168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 14:44:38 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa05, {{0x0, 0x0, "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"}}}, 0x20000260) 14:44:38 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) 14:44:38 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa02, {{0x0, 0x0, "13bd94e32c37a3932d8ad7271907f2903ccf3bb13b387d8fdf025cdf3c8faa37a970ea456fa2fd6f8354fc3b05088269a6d5b022e392b9bd78e5e2308e054c3e2cbb6e61b42c74f3c1ba8d63d10ed85dcc5d58071547cdfd9661f05024bcf8d7722e987a76fced66d3b33373d61da648b231fe3de6f7dc9a78420b7bf0a04efb660e06f2bf671a2060d09d80f7ee6ba3ae0b6edf87d14be34012ef95719e01f065ec7943a48dcce0fcf8f7f3a89c24d940f201c7c73a3c97872a80ca25d1a3114fe16f225f4f55f3c6456cab8f0aa59d8efdc6939eb7f2b223ceff25db5222ff8e86c024229beec9ce765151d6e706fd60ab8ffe4c2e736eec4bcae53c1aaaef"}}}, 0x120) 14:44:38 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa03, {{0x0, 0x0, "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"}}}, 0x120) 14:44:38 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa04, {{0x0, 0x0, "13bd94e32c37a3932d8ad7271907f2903ccf3bb13b387d8fdf025cdf3c8faa37a970ea456fa2fd6f8354fc3b05088269a6d5b022e392b9bd78e5e2308e054c3e2cbb6e61b42c74f3c1ba8d63d10ed85dcc5d58071547cdfd9661f05024bcf8d7722e987a76fced66d3b33373d61da648b231fe3de6f7dc9a78420b7bf0a04efb660e06f2bf671a2060d09d80f7ee6ba3ae0b6edf87d14be34012ef95719e01f065ec7943a48dcce0fcf8f7f3a89c24d940f201c7c73a3c97872a80ca25d1a3114fe16f225f4f55f3c6456cab8f0aa59d8efdc6939eb7f2b223ceff25db5222ff8e86c024229beec9ce765151d6e706fd60ab8ffe4c2e736eec4bcae53c1aaaef"}}}, 0x120) 14:44:38 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa06, {{0x0, 0x0, "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"}}}, 0x20000260) 14:44:38 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "e0b3772264c43c79ea3709d20d36cc4637f10fb5de2d44e0a73f520c3612063189eaba7b99fa9556bcac2ba1fb34035db66efe1e7ea748d786f601d0dcc0875cb8313c7db8b6c64b414bd5a06373bc3fbdf80ab140bf4b8f6c4a991196664cd95bbff1abeb0e982cc9b17aac4b0381a35d7a53d098e99e432a3b2f69c8b9abd7356e7cc0700ff8a36c56bf3e8a01564cd35c263749dc7c61c59645ecda836dc9f9771ff0fcdeec9e4d22cc1722bacd35e0096e747dac83ef85aed84e433e8b13e27f70ad877ff1a53934e230ed382a6c4ff7a6c1d3bb2cee4b336dcd368e29a06ed88efe1806f129bfbdfccf6c5e3ba935eb8ad0af3928b311e0a1c89eca9c75"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa05, {{0x0, 0x0, "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"}}}, 0x120) 14:44:38 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa08, {{0x0, 0x0, "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"}}}, 0x120) 14:44:38 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x20000260) (fail_nth: 19) 14:44:38 executing program 2: write$RDMA_USER_CM_CMD_REJECT(0xffffffffffffffff, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) (async) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) 14:44:38 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) 14:44:38 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x351940, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) r4 = syz_genetlink_get_family_id$devlink(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RATE_GET(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x64, r4, 0x100, 0x70bd2b, 0x25dfdbff, {}, [@handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_RATE_NODE_NAME={0xe}, @handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}]}, 0x64}, 0x1, 0x0, 0x0, 0x24048084}, 0x0) (async) sendmsg$DEVLINK_CMD_PORT_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)=ANY=[@ANYBLOB='d\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="ff042cbd7000fddbdf25050000000e0001006e657464657673696d0010000f0002006e657464657673696d30000008000300000000000e0001006e657464657673696d0000000f0002006e657464657673696d3000080000030003000000"], 0x64}, 0x1, 0x0, 0x0, 0xee2f80695921b68c}, 0x8800) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r3}}, 0x10) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000000)={0xf, 0x8, 0xfa00, {r3, 0x2}}, 0x10) (async) r5 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r5) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, &(0x7f00000001c0)={0x11, 0x10, 0xfa00, {&(0x7f0000000180)}}, 0x18) (async) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r5, &(0x7f00000004c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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", @ANYRES16=0x0, @ANYBLOB="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"], 0x124}, 0x1, 0x0, 0x0, 0x800}, 0x8004) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000500), 0x13f, 0x3}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000300)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0, r7, 0x0, 0x3}}, 0x20) 14:44:38 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) fsconfig$FSCONFIG_SET_PATH(0xffffffffffffffff, 0x3, &(0x7f0000000000)='\x00', &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c) [ 3585.571447][ T4172] RAX: ffffffffffffffda RBX: 00007f9e8dc4ff60 RCX: 00007f9e8db3d059 [ 3585.579476][ T4172] RDX: 0000000020000260 RSI: 0000000020000140 RDI: 0000000000000003 [ 3585.587474][ T4172] RBP: 00007f9e8ccb31d0 R08: 0000000000000000 R09: 0000000000000000 [ 3585.595518][ T4172] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3585.603546][ T4172] R13: 00007ffe952cf46f R14: 00007f9e8ccb3300 R15: 0000000000022000 [ 3585.611614][ T4172] 14:44:38 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x2, 0x0, "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"}}}, 0x120) 14:44:38 executing program 2: write$RDMA_USER_CM_CMD_REJECT(0xffffffffffffffff, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "e0b3772264c43c79ea3709d20d36cc4637f10fb5de2d44e0a73f520c3612063189eaba7b99fa9556bcac2ba1fb34035db66efe1e7ea748d786f601d0dcc0875cb8313c7db8b6c64b414bd5a06373bc3fbdf80ab140bf4b8f6c4a991196664cd95bbff1abeb0e982cc9b17aac4b0381a35d7a53d098e99e432a3b2f69c8b9abd7356e7cc0700ff8a36c56bf3e8a01564cd35c263749dc7c61c59645ecda836dc9f9771ff0fcdeec9e4d22cc1722bacd35e0096e747dac83ef85aed84e433e8b13e27f70ad877ff1a53934e230ed382a6c4ff7a6c1d3bb2cee4b336dcd368e29a06ed88efe1806f129bfbdfccf6c5e3ba935eb8ad0af3928b311e0a1c89eca9c75"}}, 0x110) (async) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) 14:44:38 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) (async) fsconfig$FSCONFIG_SET_PATH(0xffffffffffffffff, 0x3, &(0x7f0000000000)='\x00', &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c) 14:44:38 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "e0b3772264c43c79ea3709d20d36cc4637f10fb5de2d44e0a73f520c3612063189eaba7b99fa9556bcac2ba1fb34035db66efe1e7ea748d786f601d0dcc0875cb8313c7db8b6c64b414bd5a06373bc3fbdf80ab140bf4b8f6c4a991196664cd95bbff1abeb0e982cc9b17aac4b0381a35d7a53d098e99e432a3b2f69c8b9abd7356e7cc0700ff8a36c56bf3e8a01564cd35c263749dc7c61c59645ecda836dc9f9771ff0fcdeec9e4d22cc1722bacd35e0096e747dac83ef85aed84e433e8b13e27f70ad877ff1a53934e230ed382a6c4ff7a6c1d3bb2cee4b336dcd368e29a06ed88efe1806f129bfbdfccf6c5e3ba935eb8ad0af3928b311e0a1c89eca9c75"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x3, 0x0, "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"}}}, 0x120) [ 3585.720422][ T4219] FAULT_INJECTION: forcing a failure. [ 3585.720422][ T4219] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3585.733670][ T4219] CPU: 0 PID: 4219 Comm: syz-executor.0 Not tainted 5.17.0-rc2-syzkaller-00167-gdcb85f85fa6f-dirty #0 [ 3585.744617][ T4219] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3585.754751][ T4219] Call Trace: [ 3585.758023][ T4219] [ 3585.760950][ T4219] dump_stack_lvl+0xd6/0x122 [ 3585.765553][ T4219] dump_stack+0x11/0x1b [ 3585.769744][ T4219] should_fail+0x23c/0x250 [ 3585.774178][ T4219] should_fail_usercopy+0x16/0x20 [ 3585.779800][ T4219] copy_page_from_iter_atomic+0x2f1/0xcd0 [ 3585.785572][ T4219] ? shmem_write_begin+0x7e/0x100 [ 3585.790712][ T4219] generic_perform_write+0x211/0x400 [ 3585.796047][ T4219] ? shmem_write_begin+0x100/0x100 [ 3585.801230][ T4219] __generic_file_write_iter+0xf7/0x2b0 [ 3585.806795][ T4219] ? generic_write_checks+0x242/0x290 [ 3585.812179][ T4219] generic_file_write_iter+0x75/0x130 14:44:38 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa08, {{0x0, 0x0, "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"}}}, 0x20000260) 14:44:38 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r2) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x3, 0x5, "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", 0x81, 0x7, 0x3, 0x2, 0x1, 0x74, 0x1}, r1}}, 0x120) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000280)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0, r1, 0x0, 0x3}}, 0x20) 14:44:38 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x4, 0x0, "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"}}}, 0x120) [ 3585.817642][ T4219] vfs_write+0x7f5/0x950 [ 3585.821938][ T4219] ksys_write+0xd9/0x190 [ 3585.826202][ T4219] __x64_sys_write+0x3e/0x50 [ 3585.830850][ T4219] do_syscall_64+0x44/0xd0 [ 3585.835271][ T4219] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3585.841217][ T4219] RIP: 0033:0x7f9e8db3d059 [ 3585.845648][ T4219] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 3585.865280][ T4219] RSP: 002b:00007f9e8ccb3168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3585.873807][ T4219] RAX: ffffffffffffffda RBX: 00007f9e8dc4ff60 RCX: 00007f9e8db3d059 [ 3585.881823][ T4219] RDX: 0000000020000260 RSI: 0000000020000140 RDI: 0000000000000003 [ 3585.889793][ T4219] RBP: 00007f9e8ccb31d0 R08: 0000000000000000 R09: 0000000000000000 [ 3585.897761][ T4219] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3585.905776][ T4219] R13: 00007ffe952cf46f R14: 00007f9e8ccb3300 R15: 0000000000022000 [ 3585.913786][ T4219] 14:44:39 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "13bd94e32c37a3932d8ad7271907f2903ccf3bb13b387d8fdf025cdf3c8faa37a970ea456fa2fd6f8354fc3b05088269a6d5b022e392b9bd78e5e2308e054c3e2cbb6e61b42c74f3c1ba8d63d10ed85dcc5d58071547cdfd9661f05024bcf8d7722e987a76fced66d3b33373d61da648b231fe3de6f7dc9a78420b7bf0a04efb660e06f2bf671a2060d09d80f7ee6ba3ae0b6edf87d14be34012ef95719e01f065ec7943a48dcce0fcf8f7f3a89c24d940f201c7c73a3c97872a80ca25d1a3114fe16f225f4f55f3c6456cab8f0aa59d8efdc6939eb7f2b223ceff25db5222ff8e86c024229beec9ce765151d6e706fd60ab8ffe4c2e736eec4bcae53c1aaaef"}}}, 0x20000260) (fail_nth: 20) 14:44:39 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r0, 0x1) 14:44:39 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) fsconfig$FSCONFIG_SET_PATH(0xffffffffffffffff, 0x3, &(0x7f0000000000)='\x00', &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c) openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) (async) fsconfig$FSCONFIG_SET_PATH(0xffffffffffffffff, 0x3, &(0x7f0000000000)='\x00', &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c) (async) 14:44:39 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa0c, {{0x0, 0x0, "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"}}}, 0x20000260) 14:44:39 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r2) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x3, 0x5, "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", 0x81, 0x7, 0x3, 0x2, 0x1, 0x74, 0x1}, r1}}, 0x120) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000280)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0, r1, 0x0, 0x3}}, 0x20) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x2}}, 0x20) (async) openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) (async) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r2) (async) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x3, 0x5, "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", 0x81, 0x7, 0x3, 0x2, 0x1, 0x74, 0x1}, r1}}, 0x120) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000280)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0, r1, 0x0, 0x3}}, 0x20) (async) 14:44:39 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x5, 0x0, "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"}}}, 0x120) 14:44:39 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) (async) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "13bd94e32c37a3932d8ad7271907f2903ccf3bb13b387d8fdf025cdf3c8faa37a970ea456fa2fd6f8354fc3b05088269a6d5b022e392b9bd78e5e2308e054c3e2cbb6e61b42c74f3c1ba8d63d10ed85dcc5d58071547cdfd9661f05024bcf8d7722e987a76fced66d3b33373d61da648b231fe3de6f7dc9a78420b7bf0a04efb660e06f2bf671a2060d09d80f7ee6ba3ae0b6edf87d14be34012ef95719e01f065ec7943a48dcce0fcf8f7f3a89c24d940f201c7c73a3c97872a80ca25d1a3114fe16f225f4f55f3c6456cab8f0aa59d8efdc6939eb7f2b223ceff25db5222ff8e86c024229beec9ce765151d6e706fd60ab8ffe4c2e736eec4bcae53c1aaaef"}}}, 0x120) (async) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r0, 0x1) [ 3586.027991][ T4236] FAULT_INJECTION: forcing a failure. [ 3586.027991][ T4236] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3586.041364][ T4236] CPU: 0 PID: 4236 Comm: syz-executor.0 Not tainted 5.17.0-rc2-syzkaller-00167-gdcb85f85fa6f-dirty #0 [ 3586.052301][ T4236] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3586.062366][ T4236] Call Trace: [ 3586.065652][ T4236] [ 3586.068583][ T4236] dump_stack_lvl+0xd6/0x122 [ 3586.073243][ T4236] dump_stack+0x11/0x1b 14:44:39 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x341500, 0x0) 14:44:39 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x8, 0x0, "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"}}}, 0x120) 14:44:39 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r2) (async) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x3, 0x5, "2b547809b010d947b979257fd380cfcd90e9c86af9885089038141289ebea61f670c7121b86ef18b81dd3e74f1fae8e26e2d3704bcb60ba9379808f4b878759031633dbb3ec5b851ac9f5fbedf33c97f021f8f5b03ed3f5cdb99f86e32b365fb655bc3510882a229446d591bad7703ac640ba438b6c5a96ec2336844ed4b71b679f767aba7fb369ff312a724b9b39ea0ac6d06966e913caf93d8f6e007f347c65e82a456172c88495e88380ea8318066953f67e89689554c6b3bc34fa04af9aada4a950fa91b4025173b9cd1499e15325a251c86ce6b3bab17f3c5dce817b1a12e024fde2a30b3a0d7f75ad8d5ac9a779a23f2f96e9d7e2c7586559bca6aefbd", 0x81, 0x7, 0x3, 0x2, 0x1, 0x74, 0x1}, r1}}, 0x120) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000280)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0, r1, 0x0, 0x3}}, 0x20) [ 3586.077488][ T4236] should_fail+0x23c/0x250 [ 3586.081974][ T4236] __alloc_pages+0x102/0x330 [ 3586.086571][ T4236] alloc_pages_vma+0x67e/0x810 [ 3586.091411][ T4236] ? percpu_counter_add_batch+0x109/0x130 [ 3586.097147][ T4236] shmem_getpage_gfp+0x8b4/0x12c0 [ 3586.102200][ T4236] ? do_user_addr_fault+0x7d4/0xb90 [ 3586.107449][ T4236] shmem_write_begin+0x7e/0x100 [ 3586.112392][ T4236] generic_perform_write+0x1c8/0x400 [ 3586.117690][ T4236] ? shmem_write_begin+0x100/0x100 [ 3586.122818][ T4236] __generic_file_write_iter+0xf7/0x2b0 [ 3586.128375][ T4236] ? generic_write_checks+0x242/0x290 [ 3586.133781][ T4236] generic_file_write_iter+0x75/0x130 [ 3586.139200][ T4236] vfs_write+0x7f5/0x950 [ 3586.143456][ T4236] ksys_write+0xd9/0x190 [ 3586.147775][ T4236] __x64_sys_write+0x3e/0x50 [ 3586.152375][ T4236] do_syscall_64+0x44/0xd0 [ 3586.156855][ T4236] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3586.162815][ T4236] RIP: 0033:0x7f9e8db3d059 14:44:39 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa10, {{0x0, 0x0, "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"}}}, 0x20000260) 14:44:39 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) (async) openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x341500, 0x0) [ 3586.167372][ T4236] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 3586.186990][ T4236] RSP: 002b:00007f9e8ccb3168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3586.195422][ T4236] RAX: ffffffffffffffda RBX: 00007f9e8dc4ff60 RCX: 00007f9e8db3d059 [ 3586.203573][ T4236] RDX: 0000000020000260 RSI: 0000000020000140 RDI: 0000000000000003 [ 3586.211549][ T4236] RBP: 00007f9e8ccb31d0 R08: 0000000000000000 R09: 0000000000000000 [ 3586.219524][ T4236] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 14:44:39 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x20000260) (fail_nth: 21) 14:44:39 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) (async) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r0, 0x1) 14:44:39 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x341500, 0x0) 14:44:39 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "e0b3772264c43c79ea3709d20d36cc4637f10fb5de2d44e0a73f520c3612063189eaba7b99fa9556bcac2ba1fb34035db66efe1e7ea748d786f601d0dcc0875cb8313c7db8b6c64b414bd5a06373bc3fbdf80ab140bf4b8f6c4a991196664cd95bbff1abeb0e982cc9b17aac4b0381a35d7a53d098e99e432a3b2f69c8b9abd7356e7cc0700ff8a36c56bf3e8a01564cd35c263749dc7c61c59645ecda836dc9f9771ff0fcdeec9e4d22cc1722bacd35e0096e747dac83ef85aed84e433e8b13e27f70ad877ff1a53934e230ed382a6c4ff7a6c1d3bb2cee4b336dcd368e29a06ed88efe1806f129bfbdfccf6c5e3ba935eb8ad0af3928b311e0a1c89eca9c75"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x300, 0x0, "13bd94e32c37a3932d8ad7271907f2903ccf3bb13b387d8fdf025cdf3c8faa37a970ea456fa2fd6f8354fc3b05088269a6d5b022e392b9bd78e5e2308e054c3e2cbb6e61b42c74f3c1ba8d63d10ed85dcc5d58071547cdfd9661f05024bcf8d7722e987a76fced66d3b33373d61da648b231fe3de6f7dc9a78420b7bf0a04efb660e06f2bf671a2060d09d80f7ee6ba3ae0b6edf87d14be34012ef95719e01f065ec7943a48dcce0fcf8f7f3a89c24d940f201c7c73a3c97872a80ca25d1a3114fe16f225f4f55f3c6456cab8f0aa59d8efdc6939eb7f2b223ceff25db5222ff8e86c024229beec9ce765151d6e706fd60ab8ffe4c2e736eec4bcae53c1aaaef"}}}, 0x120) 14:44:39 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x500, 0x0, "13bd94e32c37a3932d8ad7271907f2903ccf3bb13b387d8fdf025cdf3c8faa37a970ea456fa2fd6f8354fc3b05088269a6d5b022e392b9bd78e5e2308e054c3e2cbb6e61b42c74f3c1ba8d63d10ed85dcc5d58071547cdfd9661f05024bcf8d7722e987a76fced66d3b33373d61da648b231fe3de6f7dc9a78420b7bf0a04efb660e06f2bf671a2060d09d80f7ee6ba3ae0b6edf87d14be34012ef95719e01f065ec7943a48dcce0fcf8f7f3a89c24d940f201c7c73a3c97872a80ca25d1a3114fe16f225f4f55f3c6456cab8f0aa59d8efdc6939eb7f2b223ceff25db5222ff8e86c024229beec9ce765151d6e706fd60ab8ffe4c2e736eec4bcae53c1aaaef"}}}, 0x120) 14:44:39 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0x0) (fail_nth: 1) [ 3586.227502][ T4236] R13: 00007ffe952cf46f R14: 00007f9e8ccb3300 R15: 0000000000022000 [ 3586.235506][ T4236] 14:44:39 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x410002, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000040)=[@in6={0xa, 0x4e20, 0x26d, @mcast2, 0x6}, @in={0x2, 0x4e24, @loopback}, @in6={0xa, 0x4e22, 0x1, @remote, 0x66e}, @in6={0xa, 0x4e23, 0x3, @private1, 0xffffffff}, @in={0x2, 0x4e22, @loopback}, @in={0x2, 0x4e20, @remote}, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}], 0x94) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_RATE_SET(r1, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x70bd29, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x8040}, 0x40000d1) [ 3586.290957][ T4272] FAULT_INJECTION: forcing a failure. [ 3586.290957][ T4272] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3586.304159][ T4272] CPU: 0 PID: 4272 Comm: syz-executor.5 Not tainted 5.17.0-rc2-syzkaller-00167-gdcb85f85fa6f-dirty #0 [ 3586.315112][ T4272] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3586.325175][ T4272] Call Trace: [ 3586.328460][ T4272] [ 3586.331398][ T4272] dump_stack_lvl+0xd6/0x122 [ 3586.336008][ T4272] dump_stack+0x11/0x1b 14:44:39 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r2) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x0, @empty, 0x3f}, {0xa, 0x4e22, 0xfff, @ipv4={'\x00', '\xff\xff', @broadcast}}, 0xffffffffffffffff, 0x8001}}, 0x48) clock_gettime(0x5, &(0x7f00000005c0)) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) fspick(r1, &(0x7f0000000100)='.\x00', 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r3) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000500)={0x16, 0x98, 0xfa00, {&(0x7f0000000340)={0xffffffffffffffff}, 0x4, 0xffffffffffffffff, 0x10, 0x1, @ib={0x1b, 0xff, 0xfffffff7, {"d195daab5d3a7aca8afecc71a825d244"}, 0x8, 0x2272, 0xb8e}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x10, 0xfa00, {&(0x7f0000000300), r4}}, 0x18) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x11}}, 0x10) openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r5 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r5) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r5) fsmount(r2, 0x1, 0x4) 14:44:39 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) (async) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) (async) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r2) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x0, @empty, 0x3f}, {0xa, 0x4e22, 0xfff, @ipv4={'\x00', '\xff\xff', @broadcast}}, 0xffffffffffffffff, 0x8001}}, 0x48) (async) clock_gettime(0x5, &(0x7f00000005c0)) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) (async) fspick(r1, &(0x7f0000000100)='.\x00', 0x0) (async) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "13bd94e32c37a3932d8ad7271907f2903ccf3bb13b387d8fdf025cdf3c8faa37a970ea456fa2fd6f8354fc3b05088269a6d5b022e392b9bd78e5e2308e054c3e2cbb6e61b42c74f3c1ba8d63d10ed85dcc5d58071547cdfd9661f05024bcf8d7722e987a76fced66d3b33373d61da648b231fe3de6f7dc9a78420b7bf0a04efb660e06f2bf671a2060d09d80f7ee6ba3ae0b6edf87d14be34012ef95719e01f065ec7943a48dcce0fcf8f7f3a89c24d940f201c7c73a3c97872a80ca25d1a3114fe16f225f4f55f3c6456cab8f0aa59d8efdc6939eb7f2b223ceff25db5222ff8e86c024229beec9ce765151d6e706fd60ab8ffe4c2e736eec4bcae53c1aaaef"}}}, 0x120) (async) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r3) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000500)={0x16, 0x98, 0xfa00, {&(0x7f0000000340)={0xffffffffffffffff}, 0x4, 0xffffffffffffffff, 0x10, 0x1, @ib={0x1b, 0xff, 0xfffffff7, {"d195daab5d3a7aca8afecc71a825d244"}, 0x8, 0x2272, 0xb8e}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x10, 0xfa00, {&(0x7f0000000300), r4}}, 0x18) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x11}}, 0x10) (async) openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) (async) r5 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r5) (async) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r5) (async) fsmount(r2, 0x1, 0x4) [ 3586.340348][ T4272] should_fail+0x23c/0x250 [ 3586.344778][ T4272] should_fail_usercopy+0x16/0x20 [ 3586.349837][ T4272] _copy_to_user+0x1c/0x90 [ 3586.354308][ T4272] simple_read_from_buffer+0xab/0x120 [ 3586.359692][ T4272] proc_fail_nth_read+0x10d/0x150 [ 3586.364728][ T4272] ? proc_fault_inject_write+0x230/0x230 [ 3586.370419][ T4272] vfs_read+0x1e6/0x750 [ 3586.374599][ T4272] ? __fget_files+0x1d2/0x210 [ 3586.379289][ T4272] ksys_read+0xd9/0x190 [ 3586.383516][ T4272] __x64_sys_read+0x3e/0x50 14:44:39 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x1000000, 0x0, "13bd94e32c37a3932d8ad7271907f2903ccf3bb13b387d8fdf025cdf3c8faa37a970ea456fa2fd6f8354fc3b05088269a6d5b022e392b9bd78e5e2308e054c3e2cbb6e61b42c74f3c1ba8d63d10ed85dcc5d58071547cdfd9661f05024bcf8d7722e987a76fced66d3b33373d61da648b231fe3de6f7dc9a78420b7bf0a04efb660e06f2bf671a2060d09d80f7ee6ba3ae0b6edf87d14be34012ef95719e01f065ec7943a48dcce0fcf8f7f3a89c24d940f201c7c73a3c97872a80ca25d1a3114fe16f225f4f55f3c6456cab8f0aa59d8efdc6939eb7f2b223ceff25db5222ff8e86c024229beec9ce765151d6e706fd60ab8ffe4c2e736eec4bcae53c1aaaef"}}}, 0x120) [ 3586.388097][ T4272] do_syscall_64+0x44/0xd0 [ 3586.392558][ T4272] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3586.398503][ T4272] RIP: 0033:0x7fe535ce6c0c [ 3586.402963][ T4272] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 3586.422579][ T4272] RSP: 002b:00007fe534eaa160 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 3586.431006][ T4272] RAX: ffffffffffffffda RBX: 00007fe535e46f60 RCX: 00007fe535ce6c0c [ 3586.439032][ T4272] RDX: 000000000000000f RSI: 00007fe534eaa1e0 RDI: 0000000000000004 [ 3586.447002][ T4272] RBP: 00007fe534eaa1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3586.454973][ T4272] R10: 0000000000000010 R11: 0000000000000246 R12: 0000000000000001 [ 3586.463052][ T4272] R13: 00007ffee1ac4f9f R14: 00007fe534eaa300 R15: 0000000000022000 [ 3586.466267][ T4281] FAULT_INJECTION: forcing a failure. [ 3586.466267][ T4281] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3586.471028][ T4272] 14:44:39 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x20000260) 14:44:39 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "e0b3772264c43c79ea3709d20d36cc4637f10fb5de2d44e0a73f520c3612063189eaba7b99fa9556bcac2ba1fb34035db66efe1e7ea748d786f601d0dcc0875cb8313c7db8b6c64b414bd5a06373bc3fbdf80ab140bf4b8f6c4a991196664cd95bbff1abeb0e982cc9b17aac4b0381a35d7a53d098e99e432a3b2f69c8b9abd7356e7cc0700ff8a36c56bf3e8a01564cd35c263749dc7c61c59645ecda836dc9f9771ff0fcdeec9e4d22cc1722bacd35e0096e747dac83ef85aed84e433e8b13e27f70ad877ff1a53934e230ed382a6c4ff7a6c1d3bb2cee4b336dcd368e29a06ed88efe1806f129bfbdfccf6c5e3ba935eb8ad0af3928b311e0a1c89eca9c75"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x2000000, 0x0, "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"}}}, 0x120) [ 3586.487253][ T4281] CPU: 1 PID: 4281 Comm: syz-executor.0 Not tainted 5.17.0-rc2-syzkaller-00167-gdcb85f85fa6f-dirty #0 [ 3586.498338][ T4281] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3586.508398][ T4281] Call Trace: [ 3586.511684][ T4281] [ 3586.514616][ T4281] dump_stack_lvl+0xd6/0x122 [ 3586.519222][ T4281] dump_stack+0x11/0x1b [ 3586.523384][ T4281] should_fail+0x23c/0x250 [ 3586.527828][ T4281] should_fail_usercopy+0x16/0x20 [ 3586.532864][ T4281] copy_page_from_iter_atomic+0x2f1/0xcd0 [ 3586.538613][ T4281] ? shmem_write_begin+0x7e/0x100 [ 3586.543729][ T4281] generic_perform_write+0x211/0x400 [ 3586.549018][ T4281] ? shmem_write_begin+0x100/0x100 [ 3586.554222][ T4281] __generic_file_write_iter+0xf7/0x2b0 [ 3586.559825][ T4281] ? generic_write_checks+0x242/0x290 [ 3586.565199][ T4281] generic_file_write_iter+0x75/0x130 [ 3586.570576][ T4281] vfs_write+0x7f5/0x950 [ 3586.574831][ T4281] ksys_write+0xd9/0x190 [ 3586.579109][ T4281] __x64_sys_write+0x3e/0x50 [ 3586.583700][ T4281] do_syscall_64+0x44/0xd0 [ 3586.588115][ T4281] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3586.594014][ T4281] RIP: 0033:0x7f9e8db3d059 [ 3586.598429][ T4281] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 3586.618064][ T4281] RSP: 002b:00007f9e8ccb3168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3586.626533][ T4281] RAX: ffffffffffffffda RBX: 00007f9e8dc4ff60 RCX: 00007f9e8db3d059 [ 3586.634506][ T4281] RDX: 0000000020000260 RSI: 0000000020000140 RDI: 0000000000000003 [ 3586.642480][ T4281] RBP: 00007f9e8ccb31d0 R08: 0000000000000000 R09: 0000000000000000 [ 3586.650593][ T4281] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3586.658567][ T4281] R13: 00007ffe952cf46f R14: 00007f9e8ccb3300 R15: 0000000000022000 [ 3586.666650][ T4281] 14:44:39 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "13bd94e32c37a3932d8ad7271907f2903ccf3bb13b387d8fdf025cdf3c8faa37a970ea456fa2fd6f8354fc3b05088269a6d5b022e392b9bd78e5e2308e054c3e2cbb6e61b42c74f3c1ba8d63d10ed85dcc5d58071547cdfd9661f05024bcf8d7722e987a76fced66d3b33373d61da648b231fe3de6f7dc9a78420b7bf0a04efb660e06f2bf671a2060d09d80f7ee6ba3ae0b6edf87d14be34012ef95719e01f065ec7943a48dcce0fcf8f7f3a89c24d940f201c7c73a3c97872a80ca25d1a3114fe16f225f4f55f3c6456cab8f0aa59d8efdc6939eb7f2b223ceff25db5222ff8e86c024229beec9ce765151d6e706fd60ab8ffe4c2e736eec4bcae53c1aaaef"}}}, 0x20000260) (fail_nth: 22) 14:44:39 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0x0) 14:44:39 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x410002, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000040)=[@in6={0xa, 0x4e20, 0x26d, @mcast2, 0x6}, @in={0x2, 0x4e24, @loopback}, @in6={0xa, 0x4e22, 0x1, @remote, 0x66e}, @in6={0xa, 0x4e23, 0x3, @private1, 0xffffffff}, @in={0x2, 0x4e22, @loopback}, @in={0x2, 0x4e20, @remote}, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}], 0x94) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_RATE_SET(r1, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x70bd29, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x8040}, 0x40000d1) openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) (async) openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x410002, 0x0) (async) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000040)=[@in6={0xa, 0x4e20, 0x26d, @mcast2, 0x6}, @in={0x2, 0x4e24, @loopback}, @in6={0xa, 0x4e22, 0x1, @remote, 0x66e}, @in6={0xa, 0x4e23, 0x3, @private1, 0xffffffff}, @in={0x2, 0x4e22, @loopback}, @in={0x2, 0x4e20, @remote}, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}], 0x94) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) sendmsg$DEVLINK_CMD_RATE_SET(r1, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x70bd29, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x8040}, 0x40000d1) (async) 14:44:39 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) (async) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r2) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x0, @empty, 0x3f}, {0xa, 0x4e22, 0xfff, @ipv4={'\x00', '\xff\xff', @broadcast}}, 0xffffffffffffffff, 0x8001}}, 0x48) (async) clock_gettime(0x5, &(0x7f00000005c0)) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) (async) fspick(r1, &(0x7f0000000100)='.\x00', 0x0) (async) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "13bd94e32c37a3932d8ad7271907f2903ccf3bb13b387d8fdf025cdf3c8faa37a970ea456fa2fd6f8354fc3b05088269a6d5b022e392b9bd78e5e2308e054c3e2cbb6e61b42c74f3c1ba8d63d10ed85dcc5d58071547cdfd9661f05024bcf8d7722e987a76fced66d3b33373d61da648b231fe3de6f7dc9a78420b7bf0a04efb660e06f2bf671a2060d09d80f7ee6ba3ae0b6edf87d14be34012ef95719e01f065ec7943a48dcce0fcf8f7f3a89c24d940f201c7c73a3c97872a80ca25d1a3114fe16f225f4f55f3c6456cab8f0aa59d8efdc6939eb7f2b223ceff25db5222ff8e86c024229beec9ce765151d6e706fd60ab8ffe4c2e736eec4bcae53c1aaaef"}}}, 0x120) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r3) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000500)={0x16, 0x98, 0xfa00, {&(0x7f0000000340)={0xffffffffffffffff}, 0x4, 0xffffffffffffffff, 0x10, 0x1, @ib={0x1b, 0xff, 0xfffffff7, {"d195daab5d3a7aca8afecc71a825d244"}, 0x8, 0x2272, 0xb8e}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x10, 0xfa00, {&(0x7f0000000300), r4}}, 0x18) (async) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x11}}, 0x10) openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) (async) r5 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r5) (async) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r5) (async) fsmount(r2, 0x1, 0x4) 14:44:39 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x3000000, 0x0, "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"}}}, 0x120) 14:44:39 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x2, 0x0, "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"}}}, 0x20000260) 14:44:39 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1002, 0x0, 0x10, r0, 0x0) 14:44:39 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "e0b3772264c43c79ea3709d20d36cc4637f10fb5de2d44e0a73f520c3612063189eaba7b99fa9556bcac2ba1fb34035db66efe1e7ea748d786f601d0dcc0875cb8313c7db8b6c64b414bd5a06373bc3fbdf80ab140bf4b8f6c4a991196664cd95bbff1abeb0e982cc9b17aac4b0381a35d7a53d098e99e432a3b2f69c8b9abd7356e7cc0700ff8a36c56bf3e8a01564cd35c263749dc7c61c59645ecda836dc9f9771ff0fcdeec9e4d22cc1722bacd35e0096e747dac83ef85aed84e433e8b13e27f70ad877ff1a53934e230ed382a6c4ff7a6c1d3bb2cee4b336dcd368e29a06ed88efe1806f129bfbdfccf6c5e3ba935eb8ad0af3928b311e0a1c89eca9c75"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x4000000, 0x0, "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"}}}, 0x120) 14:44:39 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x5000000, 0x0, "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"}}}, 0x120) 14:44:39 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1003, 0x0, 0x10, r0, 0x0) 14:44:39 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) (async, rerun: 32) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x410002, 0x0) (rerun: 32) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000040)=[@in6={0xa, 0x4e20, 0x26d, @mcast2, 0x6}, @in={0x2, 0x4e24, @loopback}, @in6={0xa, 0x4e22, 0x1, @remote, 0x66e}, @in6={0xa, 0x4e23, 0x3, @private1, 0xffffffff}, @in={0x2, 0x4e22, @loopback}, @in={0x2, 0x4e20, @remote}, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}], 0x94) (async) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_RATE_SET(r1, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x70bd29, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x8040}, 0x40000d1) [ 3586.778927][ T4310] FAULT_INJECTION: forcing a failure. [ 3586.778927][ T4310] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3586.792231][ T4310] CPU: 1 PID: 4310 Comm: syz-executor.0 Not tainted 5.17.0-rc2-syzkaller-00167-gdcb85f85fa6f-dirty #0 [ 3586.803176][ T4310] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3586.813235][ T4310] Call Trace: [ 3586.816517][ T4310] [ 3586.819478][ T4310] dump_stack_lvl+0xd6/0x122 [ 3586.824161][ T4310] dump_stack+0x11/0x1b 14:44:39 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "e0b3772264c43c79ea3709d20d36cc4637f10fb5de2d44e0a73f520c3612063189eaba7b99fa9556bcac2ba1fb34035db66efe1e7ea748d786f601d0dcc0875cb8313c7db8b6c64b414bd5a06373bc3fbdf80ab140bf4b8f6c4a991196664cd95bbff1abeb0e982cc9b17aac4b0381a35d7a53d098e99e432a3b2f69c8b9abd7356e7cc0700ff8a36c56bf3e8a01564cd35c263749dc7c61c59645ecda836dc9f9771ff0fcdeec9e4d22cc1722bacd35e0096e747dac83ef85aed84e433e8b13e27f70ad877ff1a53934e230ed382a6c4ff7a6c1d3bb2cee4b336dcd368e29a06ed88efe1806f129bfbdfccf6c5e3ba935eb8ad0af3928b311e0a1c89eca9c75"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x8000000, 0x0, "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"}}}, 0x120) [ 3586.828334][ T4310] should_fail+0x23c/0x250 [ 3586.832818][ T4310] __alloc_pages+0x102/0x330 [ 3586.837413][ T4310] alloc_pages_vma+0x67e/0x810 [ 3586.842184][ T4310] ? percpu_counter_add_batch+0x109/0x130 [ 3586.847939][ T4310] shmem_getpage_gfp+0x8b4/0x12c0 [ 3586.852974][ T4310] ? do_user_addr_fault+0x7d4/0xb90 [ 3586.858238][ T4310] shmem_write_begin+0x7e/0x100 [ 3586.863151][ T4310] generic_perform_write+0x1c8/0x400 [ 3586.868447][ T4310] ? shmem_write_begin+0x100/0x100 [ 3586.873696][ T4310] __generic_file_write_iter+0xf7/0x2b0 [ 3586.879249][ T4310] ? generic_write_checks+0x242/0x290 [ 3586.884635][ T4310] generic_file_write_iter+0x75/0x130 [ 3586.890057][ T4310] vfs_write+0x7f5/0x950 [ 3586.894309][ T4310] ksys_write+0xd9/0x190 [ 3586.898560][ T4310] __x64_sys_write+0x3e/0x50 [ 3586.903166][ T4310] do_syscall_64+0x44/0xd0 [ 3586.907662][ T4310] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3586.913595][ T4310] RIP: 0033:0x7f9e8db3d059 [ 3586.918008][ T4310] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 3586.937711][ T4310] RSP: 002b:00007f9e8ccb3168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3586.946124][ T4310] RAX: ffffffffffffffda RBX: 00007f9e8dc4ff60 RCX: 00007f9e8db3d059 [ 3586.954102][ T4310] RDX: 0000000020000260 RSI: 0000000020000140 RDI: 0000000000000003 [ 3586.962082][ T4310] RBP: 00007f9e8ccb31d0 R08: 0000000000000000 R09: 0000000000000000 [ 3586.970054][ T4310] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 14:44:40 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x20000260) (fail_nth: 23) 14:44:40 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1004, 0x0, 0x10, r0, 0x0) 14:44:40 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) io_setup(0x7ff, &(0x7f0000000200)=0x0) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r2) io_cancel(r1, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x1, r0, &(0x7f0000000240)="a29486b217094e2bde37578e096161efc12d7d6fdee27b4ff38ae2662658c54cf91d2567bd8b85ea6af1d9882b982e50fe8327b3cd0606884230e3e6e6e2a53db4e1f1da11e4e0e108dcb6e8fd070cbeae311d9be4af45b7a4f419a870db3359c5d9c32057e5e692c0ae34447d5c463d4084a50552c6fc1b5d760147ecfb88e1cd32079893a6fa1966fea1ceea1e633a82d08b051392a716d562c3b2df5b3761217225e4586b36bb98453efc", 0xac, 0x8, 0x0, 0x2, r2}, &(0x7f0000000340)) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x301200, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r3, &(0x7f00000001c0)={0xc, 0x8, 0xfa00, {&(0x7f0000000040)}}, 0x10) 14:44:40 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) 14:44:40 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r1) fsconfig$FSCONFIG_SET_FD(r1, 0x5, &(0x7f0000000000)=',!,[&\x00', 0x0, r0) 14:44:40 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x3, 0x0, "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"}}}, 0x20000260) 14:44:40 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x20fff000, 0x0, 0x10, r0, 0x0) [ 3586.978101][ T4310] R13: 00007ffe952cf46f R14: 00007f9e8ccb3300 R15: 0000000000022000 [ 3586.986075][ T4310] [ 3587.029064][ T4336] FAULT_INJECTION: forcing a failure. [ 3587.029064][ T4336] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3587.042289][ T4336] CPU: 0 PID: 4336 Comm: syz-executor.0 Not tainted 5.17.0-rc2-syzkaller-00167-gdcb85f85fa6f-dirty #0 [ 3587.053262][ T4336] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3587.063319][ T4336] Call Trace: [ 3587.066604][ T4336] [ 3587.069533][ T4336] dump_stack_lvl+0xd6/0x122 [ 3587.074200][ T4336] dump_stack+0x11/0x1b [ 3587.078357][ T4336] should_fail+0x23c/0x250 [ 3587.082779][ T4336] should_fail_usercopy+0x16/0x20 [ 3587.087805][ T4336] copy_page_from_iter_atomic+0x2f1/0xcd0 [ 3587.093532][ T4336] ? shmem_write_begin+0x7e/0x100 [ 3587.098563][ T4336] generic_perform_write+0x211/0x400 [ 3587.103855][ T4336] ? shmem_write_begin+0x100/0x100 [ 3587.109000][ T4336] __generic_file_write_iter+0xf7/0x2b0 [ 3587.114567][ T4336] ? generic_write_checks+0x242/0x290 [ 3587.120002][ T4336] generic_file_write_iter+0x75/0x130 [ 3587.125372][ T4336] vfs_write+0x7f5/0x950 [ 3587.129726][ T4336] ksys_write+0xd9/0x190 [ 3587.133964][ T4336] __x64_sys_write+0x3e/0x50 [ 3587.138554][ T4336] do_syscall_64+0x44/0xd0 [ 3587.142974][ T4336] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3587.148925][ T4336] RIP: 0033:0x7f9e8db3d059 [ 3587.153426][ T4336] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 14:44:40 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) (async) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) (async) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r1) fsconfig$FSCONFIG_SET_FD(r1, 0x5, &(0x7f0000000000)=',!,[&\x00', 0x0, r0) 14:44:40 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x2, "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"}}}, 0x120) 14:44:40 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x7ffffffff000, 0x0, 0x10, r0, 0x0) 14:44:40 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x4, 0x0, "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"}}}, 0x20000260) 14:44:40 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) (async) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r1) fsconfig$FSCONFIG_SET_FD(r1, 0x5, &(0x7f0000000000)=',!,[&\x00', 0x0, r0) [ 3587.173036][ T4336] RSP: 002b:00007f9e8ccb3168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3587.181453][ T4336] RAX: ffffffffffffffda RBX: 00007f9e8dc4ff60 RCX: 00007f9e8db3d059 [ 3587.189439][ T4336] RDX: 0000000020000260 RSI: 0000000020000140 RDI: 0000000000000003 [ 3587.197420][ T4336] RBP: 00007f9e8ccb31d0 R08: 0000000000000000 R09: 0000000000000000 [ 3587.205396][ T4336] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3587.213376][ T4336] R13: 00007ffe952cf46f R14: 00007f9e8ccb3300 R15: 0000000000022000 [ 3587.221365][ T4336] 14:44:40 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x20000260) (fail_nth: 24) 14:44:40 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) sendmsg$DEVLINK_CMD_PORT_UNSPLIT(r0, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0xac, 0x0, 0x70b, 0x70bd2c, 0x25dfdbff, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x3}}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x1}}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}}]}, 0xac}, 0x1, 0x0, 0x0, 0x80}, 0x4000004) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) 14:44:40 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) (async) io_setup(0x7ff, &(0x7f0000000200)=0x0) (async) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r2) io_cancel(r1, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x1, r0, &(0x7f0000000240)="a29486b217094e2bde37578e096161efc12d7d6fdee27b4ff38ae2662658c54cf91d2567bd8b85ea6af1d9882b982e50fe8327b3cd0606884230e3e6e6e2a53db4e1f1da11e4e0e108dcb6e8fd070cbeae311d9be4af45b7a4f419a870db3359c5d9c32057e5e692c0ae34447d5c463d4084a50552c6fc1b5d760147ecfb88e1cd32079893a6fa1966fea1ceea1e633a82d08b051392a716d562c3b2df5b3761217225e4586b36bb98453efc", 0xac, 0x8, 0x0, 0x2, r2}, &(0x7f0000000340)) (async) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x301200, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r3, &(0x7f00000001c0)={0xc, 0x8, 0xfa00, {&(0x7f0000000040)}}, 0x10) 14:44:40 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x7fffffffffffffff, 0x0, 0x10, r0, 0x0) 14:44:40 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x3, "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"}}}, 0x120) 14:44:40 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x5, 0x0, "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"}}}, 0x20000260) 14:44:40 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) sendmsg$DEVLINK_CMD_PORT_UNSPLIT(r0, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0xac, 0x0, 0x70b, 0x70bd2c, 0x25dfdbff, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x3}}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x1}}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}}]}, 0xac}, 0x1, 0x0, 0x0, 0x80}, 0x4000004) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) (async) sendmsg$DEVLINK_CMD_PORT_UNSPLIT(r0, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0xac, 0x0, 0x70b, 0x70bd2c, 0x25dfdbff, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x3}}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x1}}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}}]}, 0xac}, 0x1, 0x0, 0x0, 0x80}, 0x4000004) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) (async) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) (async) 14:44:40 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "e0b3772264c43c79ea3709d20d36cc4637f10fb5de2d44e0a73f520c3612063189eaba7b99fa9556bcac2ba1fb34035db66efe1e7ea748d786f601d0dcc0875cb8313c7db8b6c64b414bd5a06373bc3fbdf80ab140bf4b8f6c4a991196664cd95bbff1abeb0e982cc9b17aac4b0381a35d7a53d098e99e432a3b2f69c8b9abd7356e7cc0700ff8a36c56bf3e8a01564cd35c263749dc7c61c59645ecda836dc9f9771ff0fcdeec9e4d22cc1722bacd35e0096e747dac83ef85aed84e433e8b13e27f70ad877ff1a53934e230ed382a6c4ff7a6c1d3bb2cee4b336dcd368e29a06ed88efe1806f129bfbdfccf6c5e3ba935eb8ad0af3928b311e0a1c89eca9c75"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x4, "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"}}}, 0x120) [ 3587.377995][ T4365] FAULT_INJECTION: forcing a failure. [ 3587.377995][ T4365] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3587.391406][ T4365] CPU: 0 PID: 4365 Comm: syz-executor.0 Not tainted 5.17.0-rc2-syzkaller-00167-gdcb85f85fa6f-dirty #0 [ 3587.402434][ T4365] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3587.412597][ T4365] Call Trace: [ 3587.415885][ T4365] [ 3587.418821][ T4365] dump_stack_lvl+0xd6/0x122 [ 3587.423428][ T4365] dump_stack+0x11/0x1b [ 3587.427658][ T4365] should_fail+0x23c/0x250 [ 3587.432081][ T4365] __alloc_pages+0x102/0x330 [ 3587.436679][ T4365] alloc_pages_vma+0x67e/0x810 [ 3587.441481][ T4365] ? percpu_counter_add_batch+0x109/0x130 [ 3587.447273][ T4365] shmem_getpage_gfp+0x8b4/0x12c0 [ 3587.452335][ T4365] ? do_user_addr_fault+0x7d4/0xb90 [ 3587.457554][ T4365] shmem_write_begin+0x7e/0x100 [ 3587.462548][ T4365] generic_perform_write+0x1c8/0x400 [ 3587.467836][ T4365] ? shmem_write_begin+0x100/0x100 [ 3587.472959][ T4365] __generic_file_write_iter+0xf7/0x2b0 14:44:40 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2, 0x10, r0, 0x0) 14:44:40 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) sendmsg$DEVLINK_CMD_PORT_UNSPLIT(r0, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0xac, 0x0, 0x70b, 0x70bd2c, 0x25dfdbff, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x3}}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x1}}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}}]}, 0xac}, 0x1, 0x0, 0x0, 0x80}, 0x4000004) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "e0b3772264c43c79ea3709d20d36cc4637f10fb5de2d44e0a73f520c3612063189eaba7b99fa9556bcac2ba1fb34035db66efe1e7ea748d786f601d0dcc0875cb8313c7db8b6c64b414bd5a06373bc3fbdf80ab140bf4b8f6c4a991196664cd95bbff1abeb0e982cc9b17aac4b0381a35d7a53d098e99e432a3b2f69c8b9abd7356e7cc0700ff8a36c56bf3e8a01564cd35c263749dc7c61c59645ecda836dc9f9771ff0fcdeec9e4d22cc1722bacd35e0096e747dac83ef85aed84e433e8b13e27f70ad877ff1a53934e230ed382a6c4ff7a6c1d3bb2cee4b336dcd368e29a06ed88efe1806f129bfbdfccf6c5e3ba935eb8ad0af3928b311e0a1c89eca9c75"}}, 0x110) (async) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) 14:44:40 executing program 2: openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_REJECT(0xffffffffffffffff, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "c2327d", "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"}}, 0x110) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x2, 0x0, "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", 0x0, 0xfc}}}, 0x120) 14:44:40 executing program 2: openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_REJECT(0xffffffffffffffff, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "c2327d", "e0b3772264c43c79ea3709f08436cc4637f10fb5de2d44e0a73f520c3612063189eaba7b99fa9556bcac2ba1fb34035db66efe1e7ea748d786f601d0dcc0875cb8313c7db8b6c64b414bd5a06373bc3fbdf80ab140bf4b8f6c4a991196664cd95bbff1ab9237982cc9b17a9bea0381a35d7a53d098e99e43ad00a474c8b9abd7356e7cc0700ff8720000003e8a01564cd35c2637d90f669ac59645ecda836dc9f9771ff0fcdeec9e4d22cc1722bacd35e0096e747dac83ef85aed84e433e8b13e27f70ad877ff1a53934e230ed382a6c4ff7a6c1d3bb2cee4b336dcd368e29a06ed88efe18ffff29bfbdfccf6c5e3ba935eb8ad0af3928b311e0a1c89eca9c75"}}, 0x110) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x2, 0x0, "13bd94e32c37a3932d8ad7271907f2903ccf3bb13b387d8fdf025cdf3c8faa37a970ea456fa2fd6f8354fc3b05088269a6d5b022e392b9bd78e5e2308e054c3e2cbb6e61b42c74f3c1ba8d63d10ed85dcc5d58071547cdfd9661f05024bcf8d7722e987a76fced66d3b33373d61da648b231fe3de6f7dc9a78420b7bf0a04efb660e06f2bf671a2060d09d80f7ee6ba3ae0b6edf87d14be34012ef95719e01f065ec7943a48dcce0fcf8f7f3a89c24d940f201c7c73a3c97872a80ca25d1a3114fe16f225f4f55f3c6456cab8f0aa59d8efdc6939eb7f2b223ceff25db5222ff8e86c024229beec9ce765151d6e706fd60ab8ffe4c2e736eec4bcae53c1aaaef", 0x0, 0xfc}}}, 0x120) openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) (async) write$RDMA_USER_CM_CMD_REJECT(0xffffffffffffffff, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "c2327d", "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"}}, 0x110) (async) openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) (async) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x2, 0x0, "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", 0x0, 0xfc}}}, 0x120) (async) [ 3587.478545][ T4365] ? generic_write_checks+0x242/0x290 [ 3587.483966][ T4365] generic_file_write_iter+0x75/0x130 [ 3587.489336][ T4365] vfs_write+0x7f5/0x950 [ 3587.493585][ T4365] ksys_write+0xd9/0x190 [ 3587.497836][ T4365] __x64_sys_write+0x3e/0x50 [ 3587.502531][ T4365] do_syscall_64+0x44/0xd0 [ 3587.507081][ T4365] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3587.513100][ T4365] RIP: 0033:0x7f9e8db3d059 [ 3587.517513][ T4365] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 3587.537277][ T4365] RSP: 002b:00007f9e8ccb3168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3587.545696][ T4365] RAX: ffffffffffffffda RBX: 00007f9e8dc4ff60 RCX: 00007f9e8db3d059 [ 3587.553667][ T4365] RDX: 0000000020000260 RSI: 0000000020000140 RDI: 0000000000000003 [ 3587.561640][ T4365] RBP: 00007f9e8ccb31d0 R08: 0000000000000000 R09: 0000000000000000 [ 3587.569610][ T4365] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 14:44:40 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x20000260) (fail_nth: 25) 14:44:40 executing program 2: openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_REJECT(0xffffffffffffffff, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "c2327d", "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"}}, 0x110) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x2, 0x0, "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", 0x0, 0xfc}}}, 0x120) openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) (async) write$RDMA_USER_CM_CMD_REJECT(0xffffffffffffffff, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "c2327d", "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"}}, 0x110) (async) openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) (async) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x2, 0x0, "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", 0x0, 0xfc}}}, 0x120) (async) [ 3587.577682][ T4365] R13: 00007ffe952cf46f R14: 00007f9e8ccb3300 R15: 0000000000022000 [ 3587.585780][ T4365] [ 3587.605732][ T4391] FAULT_INJECTION: forcing a failure. [ 3587.605732][ T4391] name fail_usercopy, interval 1, probability 0, space 0, times 0 14:44:40 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) (async, rerun: 32) io_setup(0x7ff, &(0x7f0000000200)=0x0) (async, rerun: 32) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r2) io_cancel(r1, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x1, r0, &(0x7f0000000240)="a29486b217094e2bde37578e096161efc12d7d6fdee27b4ff38ae2662658c54cf91d2567bd8b85ea6af1d9882b982e50fe8327b3cd0606884230e3e6e6e2a53db4e1f1da11e4e0e108dcb6e8fd070cbeae311d9be4af45b7a4f419a870db3359c5d9c32057e5e692c0ae34447d5c463d4084a50552c6fc1b5d760147ecfb88e1cd32079893a6fa1966fea1ceea1e633a82d08b051392a716d562c3b2df5b3761217225e4586b36bb98453efc", 0xac, 0x8, 0x0, 0x2, r2}, &(0x7f0000000340)) (async, rerun: 32) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x301200, 0x0) (rerun: 32) write$RDMA_USER_CM_CMD_GET_EVENT(r3, &(0x7f00000001c0)={0xc, 0x8, 0xfa00, {&(0x7f0000000040)}}, 0x10) 14:44:40 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x5, "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"}}}, 0x120) 14:44:40 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x3, 0x10, r0, 0x0) 14:44:40 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x6, 0x0, "13bd94e32c37a3932d8ad7271907f2903ccf3bb13b387d8fdf025cdf3c8faa37a970ea456fa2fd6f8354fc3b05088269a6d5b022e392b9bd78e5e2308e054c3e2cbb6e61b42c74f3c1ba8d63d10ed85dcc5d58071547cdfd9661f05024bcf8d7722e987a76fced66d3b33373d61da648b231fe3de6f7dc9a78420b7bf0a04efb660e06f2bf671a2060d09d80f7ee6ba3ae0b6edf87d14be34012ef95719e01f065ec7943a48dcce0fcf8f7f3a89c24d940f201c7c73a3c97872a80ca25d1a3114fe16f225f4f55f3c6456cab8f0aa59d8efdc6939eb7f2b223ceff25db5222ff8e86c024229beec9ce765151d6e706fd60ab8ffe4c2e736eec4bcae53c1aaaef"}}}, 0x20000260) 14:44:40 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x4d2280, 0x0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x380, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000080), 0x182, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "13bd94e32c37a3932d8ad72719b01892b0cf3bb13b387d8fdf025cdf3c8faa37a970ea456fa2fa6f8354fc3b05088269a6d5b022e392b9bd78e5e2308e054c3e2cbb6e61b42c74f341ba8d67d10ed840cc5d58bcf8d7722e987a76fced66d3b33373d61da648b231fe3de6f7dc9a78420b7bf0a04efb660e06f2bfe71a2060d09d80f7ee6ba3ae0b6edfa7d14be34012ef95719e01f465ec7943a48dcce0fcf8f7f3a8ab8f0aa59d8efdc6939eb7f2b2238eff25db5222ff8e86c024229beec9ce7651ffd6e706fd60ab8ffe4c2e736eec4bcae5381aaaef000000ecffffff00", 0x9, 0x0, 0x0, 0x72, 0x0, 0x5, 0x10}}}, 0x120) openat$bsg(0xffffffffffffff9c, &(0x7f0000000040), 0x20000, 0x0) 14:44:40 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x4d2280, 0x0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) (async) openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x380, 0x0) (async) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000080), 0x182, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "13bd94e32c37a3932d8ad72719b01892b0cf3bb13b387d8fdf025cdf3c8faa37a970ea456fa2fa6f8354fc3b05088269a6d5b022e392b9bd78e5e2308e054c3e2cbb6e61b42c74f341ba8d67d10ed840cc5d58bcf8d7722e987a76fced66d3b33373d61da648b231fe3de6f7dc9a78420b7bf0a04efb660e06f2bfe71a2060d09d80f7ee6ba3ae0b6edfa7d14be34012ef95719e01f465ec7943a48dcce0fcf8f7f3a8ab8f0aa59d8efdc6939eb7f2b2238eff25db5222ff8e86c024229beec9ce7651ffd6e706fd60ab8ffe4c2e736eec4bcae5381aaaef000000ecffffff00", 0x9, 0x0, 0x0, 0x72, 0x0, 0x5, 0x10}}}, 0x120) (async) openat$bsg(0xffffffffffffff9c, &(0x7f0000000040), 0x20000, 0x0) 14:44:40 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x4, 0x10, r0, 0x0) 14:44:40 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x4d2280, 0x0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x380, 0x0) (async) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000080), 0x182, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "13bd94e32c37a3932d8ad72719b01892b0cf3bb13b387d8fdf025cdf3c8faa37a970ea456fa2fa6f8354fc3b05088269a6d5b022e392b9bd78e5e2308e054c3e2cbb6e61b42c74f341ba8d67d10ed840cc5d58bcf8d7722e987a76fced66d3b33373d61da648b231fe3de6f7dc9a78420b7bf0a04efb660e06f2bfe71a2060d09d80f7ee6ba3ae0b6edfa7d14be34012ef95719e01f465ec7943a48dcce0fcf8f7f3a8ab8f0aa59d8efdc6939eb7f2b2238eff25db5222ff8e86c024229beec9ce7651ffd6e706fd60ab8ffe4c2e736eec4bcae5381aaaef000000ecffffff00", 0x9, 0x0, 0x0, 0x72, 0x0, 0x5, 0x10}}}, 0x120) (async, rerun: 64) openat$bsg(0xffffffffffffff9c, &(0x7f0000000040), 0x20000, 0x0) (rerun: 64) [ 3587.618896][ T4391] CPU: 1 PID: 4391 Comm: syz-executor.0 Not tainted 5.17.0-rc2-syzkaller-00167-gdcb85f85fa6f-dirty #0 [ 3587.629928][ T4391] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3587.640101][ T4391] Call Trace: [ 3587.643458][ T4391] [ 3587.646388][ T4391] dump_stack_lvl+0xd6/0x122 [ 3587.651022][ T4391] dump_stack+0x11/0x1b [ 3587.655193][ T4391] should_fail+0x23c/0x250 [ 3587.659758][ T4391] should_fail_usercopy+0x16/0x20 [ 3587.664790][ T4391] copy_page_from_iter_atomic+0x2f1/0xcd0 [ 3587.670643][ T4391] ? shmem_write_begin+0x7e/0x100 14:44:40 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x300, 0x10, r0, 0x0) 14:44:40 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r1) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000), 0x13f, 0xa}}, 0x20) [ 3587.675722][ T4391] generic_perform_write+0x211/0x400 [ 3587.681012][ T4391] ? shmem_write_begin+0x100/0x100 [ 3587.686135][ T4391] __generic_file_write_iter+0xf7/0x2b0 [ 3587.691687][ T4391] ? generic_write_checks+0x242/0x290 [ 3587.697073][ T4391] generic_file_write_iter+0x75/0x130 [ 3587.702526][ T4391] vfs_write+0x7f5/0x950 [ 3587.706780][ T4391] ksys_write+0xd9/0x190 [ 3587.711027][ T4391] __x64_sys_write+0x3e/0x50 [ 3587.715751][ T4391] do_syscall_64+0x44/0xd0 [ 3587.720173][ T4391] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3587.726124][ T4391] RIP: 0033:0x7f9e8db3d059 [ 3587.730597][ T4391] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 3587.733077][ T24] audit: type=1400 audit(1643985880.801:264): avc: denied { execute } for pid=4403 comm="syz-executor.5" path=2F6465762F6273672F2332323334202864656C6574656429 dev="devtmpfs" ino=2234 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=file permissive=1 [ 3587.750200][ T4391] RSP: 002b:00007f9e8ccb3168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3587.750232][ T4391] RAX: ffffffffffffffda RBX: 00007f9e8dc4ff60 RCX: 00007f9e8db3d059 [ 3587.750244][ T4391] RDX: 0000000020000260 RSI: 0000000020000140 RDI: 0000000000000003 [ 3587.800627][ T4391] RBP: 00007f9e8ccb31d0 R08: 0000000000000000 R09: 0000000000000000 [ 3587.808624][ T4391] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3587.816586][ T4391] R13: 00007ffe952cf46f R14: 00007f9e8ccb3300 R15: 0000000000022000 [ 3587.824540][ T4391] 14:44:41 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x20000260) (fail_nth: 26) 14:44:41 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, 0x10, r0, 0x0) 14:44:41 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "e0b3772264c43c79ea3709d20d36cc4637f10fb5de2d44e0a73f520c3612063189eaba7b99fa9556bcac2ba1fb34035db66efe1e7ea748d786f601d0dcc0875cb8313c7db8b6c64b414bd5a06373bc3fbdf80ab140bf4b8f6c4a991196664cd95bbff1abeb0e982cc9b17aac4b0381a35d7a53d098e99e432a3b2f69c8b9abd7356e7cc0700ff8a36c56bf3e8a01564cd35c263749dc7c61c59645ecda836dc9f9771ff0fcdeec9e4d22cc1722bacd35e0096e747dac83ef85aed84e433e8b13e27f70ad877ff1a53934e230ed382a6c4ff7a6c1d3bb2cee4b336dcd368e29a06ed88efe1806f129bfbdfccf6c5e3ba935eb8ad0af3928b311e0a1c89eca9c75"}}, 0x110) (async) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) (async) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r1) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000), 0x13f, 0xa}}, 0x20) 14:44:41 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x8, 0x0, "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"}}}, 0x20000260) 14:44:41 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x8, "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"}}}, 0x120) 14:44:41 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) prctl$PR_GET_FPEXC(0xb, &(0x7f00000003c0)) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r5, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r6}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x7, @ipv4={'\x00', '\xff\xff', @multicast1}, 0x80000000}, {0xa, 0x4e24, 0xfffffffa, @local, 0x6}, r6, 0x54}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r3}}, 0x10) r7 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r7) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r7, &(0x7f0000000200)={0x9, 0x108, 0xfa00, {r8, 0x1, "89a53f", "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"}}, 0x110) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000000)=0x1, r3, 0x0, 0x2, 0x4}}, 0x20) 14:44:41 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r1) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000), 0x13f, 0xa}}, 0x20) openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "e0b3772264c43c79ea3709d20d36cc4637f10fb5de2d44e0a73f520c3612063189eaba7b99fa9556bcac2ba1fb34035db66efe1e7ea748d786f601d0dcc0875cb8313c7db8b6c64b414bd5a06373bc3fbdf80ab140bf4b8f6c4a991196664cd95bbff1abeb0e982cc9b17aac4b0381a35d7a53d098e99e432a3b2f69c8b9abd7356e7cc0700ff8a36c56bf3e8a01564cd35c263749dc7c61c59645ecda836dc9f9771ff0fcdeec9e4d22cc1722bacd35e0096e747dac83ef85aed84e433e8b13e27f70ad877ff1a53934e230ed382a6c4ff7a6c1d3bb2cee4b336dcd368e29a06ed88efe1806f129bfbdfccf6c5e3ba935eb8ad0af3928b311e0a1c89eca9c75"}}, 0x110) (async) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) (async) openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) (async) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r1) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000), 0x13f, 0xa}}, 0x20) (async) 14:44:41 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000000, 0x10, r0, 0x0) 14:44:41 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x300, "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"}}}, 0x120) 14:44:41 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) (async) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) (async) prctl$PR_GET_FPEXC(0xb, &(0x7f00000003c0)) (async) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async, rerun: 64) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) (rerun: 64) write$RDMA_USER_CM_CMD_NOTIFY(r5, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r6}}, 0x10) (async, rerun: 32) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x7, @ipv4={'\x00', '\xff\xff', @multicast1}, 0x80000000}, {0xa, 0x4e24, 0xfffffffa, @local, 0x6}, r6, 0x54}}, 0x48) (async, rerun: 32) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r3}}, 0x10) (async) r7 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r7) (async, rerun: 64) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x2}}, 0x20) (rerun: 64) write$RDMA_USER_CM_CMD_REJECT(r7, &(0x7f0000000200)={0x9, 0x108, 0xfa00, {r8, 0x1, "89a53f", "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"}}, 0x110) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000000)=0x1, r3, 0x0, 0x2, 0x4}}, 0x20) [ 3587.962962][ T4429] FAULT_INJECTION: forcing a failure. [ 3587.962962][ T4429] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3587.976357][ T4429] CPU: 1 PID: 4429 Comm: syz-executor.0 Not tainted 5.17.0-rc2-syzkaller-00167-gdcb85f85fa6f-dirty #0 [ 3587.987368][ T4429] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3587.997484][ T4429] Call Trace: [ 3588.000762][ T4429] [ 3588.003689][ T4429] dump_stack_lvl+0xd6/0x122 [ 3588.008329][ T4429] dump_stack+0x11/0x1b [ 3588.012558][ T4429] should_fail+0x23c/0x250 [ 3588.017086][ T4429] __alloc_pages+0x102/0x330 [ 3588.021677][ T4429] alloc_pages_vma+0x67e/0x810 [ 3588.026447][ T4429] ? percpu_counter_add_batch+0x109/0x130 [ 3588.032177][ T4429] shmem_getpage_gfp+0x8b4/0x12c0 [ 3588.037211][ T4429] ? do_user_addr_fault+0x7d4/0xb90 [ 3588.042423][ T4429] shmem_write_begin+0x7e/0x100 [ 3588.047288][ T4429] generic_perform_write+0x1c8/0x400 [ 3588.052674][ T4429] ? shmem_write_begin+0x100/0x100 [ 3588.057832][ T4429] __generic_file_write_iter+0xf7/0x2b0 [ 3588.063423][ T4429] ? generic_write_checks+0x242/0x290 [ 3588.068803][ T4429] generic_file_write_iter+0x75/0x130 [ 3588.074181][ T4429] vfs_write+0x7f5/0x950 [ 3588.078488][ T4429] ksys_write+0xd9/0x190 [ 3588.082756][ T4429] __x64_sys_write+0x3e/0x50 [ 3588.087367][ T4429] do_syscall_64+0x44/0xd0 [ 3588.091846][ T4429] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3588.097775][ T4429] RIP: 0033:0x7f9e8db3d059 14:44:41 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x3000000, 0x10, r0, 0x0) 14:44:41 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) prctl$PR_GET_FPEXC(0xb, &(0x7f00000003c0)) (async, rerun: 32) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (rerun: 32) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r5, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r6}}, 0x10) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x7, @ipv4={'\x00', '\xff\xff', @multicast1}, 0x80000000}, {0xa, 0x4e24, 0xfffffffa, @local, 0x6}, r6, 0x54}}, 0x48) (async) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r3}}, 0x10) (async) r7 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r7) (async, rerun: 64) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x2}}, 0x20) (rerun: 64) write$RDMA_USER_CM_CMD_REJECT(r7, &(0x7f0000000200)={0x9, 0x108, 0xfa00, {r8, 0x1, "89a53f", "3bbebe43d464283167ead5009cf41bbb34aceb442d17905cbd68d32cc7366574b2928fa4a90aa5eb6e0a65d6b91337514959952190f7dbdd5443f182687cccdcd4a39497eea1f643d92dc0ec7c2029ec07fadb351d52e0b84bf64a1e0536bf269a1c6ad29edf8925a40ae41fbe3352e060fee631b37ebdd7c91b3c199eb29bfd9408a7f7f36535fda7c5cb262d1e89981d5312cac1cd6a69e718b4f6963454b1b1e8bc87bad88e3385db9b0f74d7d95e7da803dcb7349f64a2c10f81a1f822a621e392cda95a6f15516e944ebd565d48e5145996b363c9e9fc86c96514216d859f23c575acc87689a96524b1ad56c06dc52422a6c46a1bc7d7e4bb02131a6367"}}, 0x110) (async, rerun: 64) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000000)=0x1, r3, 0x0, 0x2, 0x4}}, 0x20) (rerun: 64) [ 3588.102183][ T4429] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 3588.121855][ T4429] RSP: 002b:00007f9e8ccb3168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3588.130282][ T4429] RAX: ffffffffffffffda RBX: 00007f9e8dc4ff60 RCX: 00007f9e8db3d059 [ 3588.138272][ T4429] RDX: 0000000020000260 RSI: 0000000020000140 RDI: 0000000000000003 [ 3588.146269][ T4429] RBP: 00007f9e8ccb31d0 R08: 0000000000000000 R09: 0000000000000000 [ 3588.154252][ T4429] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 14:44:41 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x20000260) (fail_nth: 27) 14:44:41 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x500, "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"}}}, 0x120) 14:44:41 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r1) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000003c0)={0x9, 0xfffffec6, 0xfa00, {0xffffffffffffffff, 0x0, "07ff01", "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"}}, 0x110) r2 = fsmount(r0, 0x0, 0x1) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000080)=0x9, 0x4) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r3) write$RDMA_USER_CM_CMD_MIGRATE_ID(r2, &(0x7f0000000040)={0x12, 0x10, 0xfa00, {&(0x7f0000000000), 0xffffffffffffffff, r3}}, 0x18) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) 14:44:41 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0xc, 0x0, "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"}}}, 0x20000260) 14:44:41 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) r1 = inotify_init() inotify_rm_watch(r1, 0x0) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) r2 = inotify_init() inotify_rm_watch(r2, 0x0) r3 = inotify_init() inotify_rm_watch(r3, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000000)=[r1, r0, r2, r3], 0x4) 14:44:41 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x4000000, 0x10, r0, 0x0) 14:44:41 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x7fffffffffffe, 0x10, r0, 0x0) [ 3588.162232][ T4429] R13: 00007ffe952cf46f R14: 00007f9e8ccb3300 R15: 0000000000022000 [ 3588.170227][ T4429] [ 3588.191732][ T4463] FAULT_INJECTION: forcing a failure. [ 3588.191732][ T4463] name fail_usercopy, interval 1, probability 0, space 0, times 0 14:44:41 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x100000000000000, 0x10, r0, 0x0) 14:44:41 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r1) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000003c0)={0x9, 0xfffffec6, 0xfa00, {0xffffffffffffffff, 0x0, "07ff01", "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"}}, 0x110) (async) r2 = fsmount(r0, 0x0, 0x1) (async) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000080)=0x9, 0x4) (async) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r3) write$RDMA_USER_CM_CMD_MIGRATE_ID(r2, &(0x7f0000000040)={0x12, 0x10, 0xfa00, {&(0x7f0000000000), 0xffffffffffffffff, r3}}, 0x18) (async) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) 14:44:41 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x1000000, "13bd94e32c37a3932d8ad7271907f2903ccf3bb13b387d8fdf025cdf3c8faa37a970ea456fa2fd6f8354fc3b05088269a6d5b022e392b9bd78e5e2308e054c3e2cbb6e61b42c74f3c1ba8d63d10ed85dcc5d58071547cdfd9661f05024bcf8d7722e987a76fced66d3b33373d61da648b231fe3de6f7dc9a78420b7bf0a04efb660e06f2bf671a2060d09d80f7ee6ba3ae0b6edf87d14be34012ef95719e01f065ec7943a48dcce0fcf8f7f3a89c24d940f201c7c73a3c97872a80ca25d1a3114fe16f225f4f55f3c6456cab8f0aa59d8efdc6939eb7f2b223ceff25db5222ff8e86c024229beec9ce765151d6e706fd60ab8ffe4c2e736eec4bcae53c1aaaef"}}}, 0x120) [ 3588.204989][ T4463] CPU: 1 PID: 4463 Comm: syz-executor.0 Not tainted 5.17.0-rc2-syzkaller-00167-gdcb85f85fa6f-dirty #0 [ 3588.215928][ T4463] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3588.225988][ T4463] Call Trace: [ 3588.229326][ T4463] [ 3588.232267][ T4463] dump_stack_lvl+0xd6/0x122 [ 3588.236872][ T4463] dump_stack+0x11/0x1b [ 3588.241081][ T4463] should_fail+0x23c/0x250 [ 3588.245503][ T4463] should_fail_usercopy+0x16/0x20 [ 3588.250588][ T4463] copy_page_from_iter_atomic+0x2f1/0xcd0 [ 3588.256341][ T4463] ? shmem_write_begin+0x7e/0x100 14:44:41 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x2000000, "13bd94e32c37a3932d8ad7271907f2903ccf3bb13b387d8fdf025cdf3c8faa37a970ea456fa2fd6f8354fc3b05088269a6d5b022e392b9bd78e5e2308e054c3e2cbb6e61b42c74f3c1ba8d63d10ed85dcc5d58071547cdfd9661f05024bcf8d7722e987a76fced66d3b33373d61da648b231fe3de6f7dc9a78420b7bf0a04efb660e06f2bf671a2060d09d80f7ee6ba3ae0b6edf87d14be34012ef95719e01f065ec7943a48dcce0fcf8f7f3a89c24d940f201c7c73a3c97872a80ca25d1a3114fe16f225f4f55f3c6456cab8f0aa59d8efdc6939eb7f2b223ceff25db5222ff8e86c024229beec9ce765151d6e706fd60ab8ffe4c2e736eec4bcae53c1aaaef"}}}, 0x120) 14:44:41 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x3000000, "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"}}}, 0x120) [ 3588.261421][ T4463] generic_perform_write+0x211/0x400 [ 3588.266713][ T4463] ? shmem_write_begin+0x100/0x100 [ 3588.271872][ T4463] __generic_file_write_iter+0xf7/0x2b0 [ 3588.277426][ T4463] ? generic_write_checks+0x242/0x290 [ 3588.282829][ T4463] generic_file_write_iter+0x75/0x130 [ 3588.288214][ T4463] vfs_write+0x7f5/0x950 [ 3588.292465][ T4463] ksys_write+0xd9/0x190 [ 3588.296752][ T4463] __x64_sys_write+0x3e/0x50 [ 3588.301345][ T4463] do_syscall_64+0x44/0xd0 [ 3588.305867][ T4463] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3588.311778][ T4463] RIP: 0033:0x7f9e8db3d059 [ 3588.316253][ T4463] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 3588.335967][ T4463] RSP: 002b:00007f9e8ccb3168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3588.344482][ T4463] RAX: ffffffffffffffda RBX: 00007f9e8dc4ff60 RCX: 00007f9e8db3d059 [ 3588.352504][ T4463] RDX: 0000000020000260 RSI: 0000000020000140 RDI: 0000000000000003 [ 3588.360509][ T4463] RBP: 00007f9e8ccb31d0 R08: 0000000000000000 R09: 0000000000000000 [ 3588.368665][ T4463] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3588.376659][ T4463] R13: 00007ffe952cf46f R14: 00007f9e8ccb3300 R15: 0000000000022000 [ 3588.384778][ T4463] 14:44:41 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x20000260) (fail_nth: 28) 14:44:41 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x4000000, "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"}}}, 0x120) 14:44:41 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x200000000000000, 0x10, r0, 0x0) 14:44:41 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r1) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000003c0)={0x9, 0xfffffec6, 0xfa00, {0xffffffffffffffff, 0x0, "07ff01", "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"}}, 0x110) r2 = fsmount(r0, 0x0, 0x1) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000080)=0x9, 0x4) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r3) write$RDMA_USER_CM_CMD_MIGRATE_ID(r2, &(0x7f0000000040)={0x12, 0x10, 0xfa00, {&(0x7f0000000000), 0xffffffffffffffff, r3}}, 0x18) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) (async) openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) (async) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r1) (async) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000003c0)={0x9, 0xfffffec6, 0xfa00, {0xffffffffffffffff, 0x0, "07ff01", "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"}}, 0x110) (async) fsmount(r0, 0x0, 0x1) (async) openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) (async) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000080)=0x9, 0x4) (async) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r3) (async) write$RDMA_USER_CM_CMD_MIGRATE_ID(r2, &(0x7f0000000040)={0x12, 0x10, 0xfa00, {&(0x7f0000000000), 0xffffffffffffffff, r3}}, 0x18) (async) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "13bd94e32c37a3932d8ad7271907f2903ccf3bb13b387d8fdf025cdf3c8faa37a970ea456fa2fd6f8354fc3b05088269a6d5b022e392b9bd78e5e2308e054c3e2cbb6e61b42c74f3c1ba8d63d10ed85dcc5d58071547cdfd9661f05024bcf8d7722e987a76fced66d3b33373d61da648b231fe3de6f7dc9a78420b7bf0a04efb660e06f2bf671a2060d09d80f7ee6ba3ae0b6edf87d14be34012ef95719e01f065ec7943a48dcce0fcf8f7f3a89c24d940f201c7c73a3c97872a80ca25d1a3114fe16f225f4f55f3c6456cab8f0aa59d8efdc6939eb7f2b223ceff25db5222ff8e86c024229beec9ce765151d6e706fd60ab8ffe4c2e736eec4bcae53c1aaaef"}}}, 0x120) (async) 14:44:41 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) (async) r1 = inotify_init() inotify_rm_watch(r1, 0x0) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) (async) r2 = inotify_init() inotify_rm_watch(r2, 0x0) (async) r3 = inotify_init() inotify_rm_watch(r3, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000000)=[r1, r0, r2, r3], 0x4) 14:44:41 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x10, 0x0, "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"}}}, 0x20000260) 14:44:41 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x300000000000000, 0x10, r0, 0x0) 14:44:41 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x5000000, "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"}}}, 0x120) 14:44:41 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) (async) r1 = inotify_init() inotify_rm_watch(r1, 0x0) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) r2 = inotify_init() inotify_rm_watch(r2, 0x0) r3 = inotify_init() inotify_rm_watch(r3, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000000)=[r1, r0, r2, r3], 0x4) 14:44:41 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "e0b3772264c43c79ea3709d20d36cc4637f10fb5de2d44e0a73f520c3612063189eaba7b99fa9556bcac2ba1fb34035db66efe1e7ea748d786f601d0dcc0875cb8313c7db8b6c64b414bd5a06373bc3fbdf80ab140bf4b8f6c4a991196664cd95bbff1abeb0e982cc9b17aac4b0381a35d7a53d098e99e432a3b2f69c8b9abd7356e7cc0700ff8a36c56bf3e8a01564cd35c263749dc7c61c59645ecda836dc9f9771ff0fcdeec9e4d22cc1722bacd35e0096e747dac83ef85aed84e433e8b13e27f70ad877ff1a53934e230ed382a6c4ff7a6c1d3bb2cee4b336dcd368e29a06ed88efe1806f129bfbdfccf6c5e3ba935eb8ad0af3928b311e0a1c89eca9c75"}}, 0x110) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x6}}}, 0x120) 14:44:41 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x6}}}, 0x120) [ 3588.523182][ T4502] FAULT_INJECTION: forcing a failure. [ 3588.523182][ T4502] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3588.536454][ T4502] CPU: 1 PID: 4502 Comm: syz-executor.0 Not tainted 5.17.0-rc2-syzkaller-00167-gdcb85f85fa6f-dirty #0 [ 3588.547455][ T4502] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3588.557791][ T4502] Call Trace: [ 3588.561071][ T4502] [ 3588.564039][ T4502] dump_stack_lvl+0xd6/0x122 [ 3588.568698][ T4502] dump_stack+0x11/0x1b 14:44:41 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000000000000, 0x10, r0, 0x0) [ 3588.572874][ T4502] should_fail+0x23c/0x250 [ 3588.577297][ T4502] __alloc_pages+0x102/0x330 [ 3588.581895][ T4502] alloc_pages_vma+0x67e/0x810 [ 3588.586685][ T4502] ? percpu_counter_add_batch+0x109/0x130 [ 3588.592481][ T4502] shmem_getpage_gfp+0x8b4/0x12c0 [ 3588.597579][ T4502] ? do_user_addr_fault+0x7d4/0xb90 [ 3588.602934][ T4502] shmem_write_begin+0x7e/0x100 [ 3588.607797][ T4502] generic_perform_write+0x1c8/0x400 [ 3588.613153][ T4502] ? shmem_write_begin+0x100/0x100 [ 3588.618291][ T4502] __generic_file_write_iter+0xf7/0x2b0 [ 3588.623849][ T4502] ? generic_write_checks+0x242/0x290 [ 3588.629279][ T4502] generic_file_write_iter+0x75/0x130 [ 3588.634658][ T4502] vfs_write+0x7f5/0x950 [ 3588.638971][ T4502] ksys_write+0xd9/0x190 [ 3588.643277][ T4502] __x64_sys_write+0x3e/0x50 [ 3588.647870][ T4502] do_syscall_64+0x44/0xd0 [ 3588.652300][ T4502] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3588.658263][ T4502] RIP: 0033:0x7f9e8db3d059 [ 3588.662762][ T4502] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 3588.682526][ T4502] RSP: 002b:00007f9e8ccb3168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3588.690948][ T4502] RAX: ffffffffffffffda RBX: 00007f9e8dc4ff60 RCX: 00007f9e8db3d059 [ 3588.698919][ T4502] RDX: 0000000020000260 RSI: 0000000020000140 RDI: 0000000000000003 [ 3588.707037][ T4502] RBP: 00007f9e8ccb31d0 R08: 0000000000000000 R09: 0000000000000000 [ 3588.715286][ T4502] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 14:44:41 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x20000260) (fail_nth: 29) 14:44:41 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0xfeffffffffff0700, 0x10, r0, 0x0) 14:44:41 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) (async) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "13bd94e32c37a3932d8ad7271907f2903ccf3bb13b387d8fdf025cdf3c8faa37a970ea456fa2fd6f8354fc3b05088269a6d5b022e392b9bd78e5e2308e054c3e2cbb6e61b42c74f3c1ba8d63d10ed85dcc5d58071547cdfd9661f05024bcf8d7722e987a76fced66d3b33373d61da648b231fe3de6f7dc9a78420b7bf0a04efb660e06f2bf671a2060d09d80f7ee6ba3ae0b6edf87d14be34012ef95719e01f065ec7943a48dcce0fcf8f7f3a89c24d940f201c7c73a3c97872a80ca25d1a3114fe16f225f4f55f3c6456cab8f0aa59d8efdc6939eb7f2b223ceff25db5222ff8e86c024229beec9ce765151d6e706fd60ab8ffe4c2e736eec4bcae53c1aaaef", 0x6}}}, 0x120) 14:44:41 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x8000000, "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"}}}, 0x120) 14:44:41 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000100), 0x200, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f00000002c0)={0xc, 0x8, 0xfa00, {&(0x7f0000000140)}}, 0x10) r1 = openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) syz_io_uring_setup(0x7eff, &(0x7f0000000000)={0x0, 0x7b36, 0x9, 0x0, 0x332, 0x0, r1}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) 14:44:41 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x204, 0x0, "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"}}}, 0x20000260) 14:44:41 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0x2) [ 3588.723267][ T4502] R13: 00007ffe952cf46f R14: 00007f9e8ccb3300 R15: 0000000000022000 [ 3588.731242][ T4502] [ 3588.757765][ T4520] FAULT_INJECTION: forcing a failure. [ 3588.757765][ T4520] name fail_usercopy, interval 1, probability 0, space 0, times 0 14:44:41 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) 14:44:41 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x2}}}, 0x120) [ 3588.770882][ T4520] CPU: 1 PID: 4520 Comm: syz-executor.0 Not tainted 5.17.0-rc2-syzkaller-00167-gdcb85f85fa6f-dirty #0 [ 3588.781956][ T4520] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3588.792056][ T4520] Call Trace: [ 3588.795338][ T4520] [ 3588.798309][ T4520] dump_stack_lvl+0xd6/0x122 [ 3588.802982][ T4520] dump_stack+0x11/0x1b [ 3588.807145][ T4520] should_fail+0x23c/0x250 [ 3588.811623][ T4520] should_fail_usercopy+0x16/0x20 [ 3588.816751][ T4520] copy_page_from_iter_atomic+0x2f1/0xcd0 [ 3588.822487][ T4520] ? shmem_write_begin+0x7e/0x100 [ 3588.827526][ T4520] generic_perform_write+0x211/0x400 [ 3588.832880][ T4520] ? shmem_write_begin+0x100/0x100 [ 3588.837995][ T4520] __generic_file_write_iter+0xf7/0x2b0 [ 3588.843549][ T4520] ? generic_write_checks+0x242/0x290 [ 3588.849010][ T4520] generic_file_write_iter+0x75/0x130 [ 3588.854389][ T4520] vfs_write+0x7f5/0x950 [ 3588.858697][ T4520] ksys_write+0xd9/0x190 [ 3588.862944][ T4520] __x64_sys_write+0x3e/0x50 [ 3588.867539][ T4520] do_syscall_64+0x44/0xd0 14:44:42 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0x3) 14:44:42 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) r1 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs2/binder1\x00', 0x2, 0x0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f00000000c0)=0xffffffff, 0x4) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(r1, 0x40046210, &(0x7f0000000040)=0x1) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "e0b3772264c43c79ea3709d20d36cc4637f10fb5de2d44e0a73f520c3612063189eaba7b99fa9556bcac2ba1fb34035db66efe1e7ea748d786f601d0dcc0875cb8313c7db8b6c64b414bd5a06373bc3fbdf80ab140bf4b8f6c4a991196664cd95bbff1abeb0e982cc9b17aac4b0381a35d7a53d098e99e432a3b2f69c8b9abd7356e7cc0700ff8a36c56bf3e8a01564cd35c263749dc7c61c59645ecda836dc9f9771ff0fcdeec9e4d22cc1722bacd35e0096e747dac83ef85aed84e433e8b13e27f70ad877ff1a53934e230ed382a6c4ff7a6c1d3bb2cee4b336dcd368e29a06ed88efe1806f129bfbdfccf6c5e3ba935eb8ad0af3928b311e0a1c89eca9c75"}}, 0x110) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) 14:44:42 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000100), 0x200, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f00000002c0)={0xc, 0x8, 0xfa00, {&(0x7f0000000140)}}, 0x10) (async) r1 = openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) syz_io_uring_setup(0x7eff, &(0x7f0000000000)={0x0, 0x7b36, 0x9, 0x0, 0x332, 0x0, r1}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) [ 3588.871963][ T4520] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3588.877939][ T4520] RIP: 0033:0x7f9e8db3d059 [ 3588.882348][ T4520] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 3588.901967][ T4520] RSP: 002b:00007f9e8ccb3168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3588.910435][ T4520] RAX: ffffffffffffffda RBX: 00007f9e8dc4ff60 RCX: 00007f9e8db3d059 [ 3588.918413][ T4520] RDX: 0000000020000260 RSI: 0000000020000140 RDI: 0000000000000003 [ 3588.926453][ T4520] RBP: 00007f9e8ccb31d0 R08: 0000000000000000 R09: 0000000000000000 [ 3588.934432][ T4520] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3588.942456][ T4520] R13: 00007ffe952cf46f R14: 00007f9e8ccb3300 R15: 0000000000022000 [ 3588.950435][ T4520] 14:44:42 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x20000260) (fail_nth: 30) 14:44:42 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x3}}}, 0x120) 14:44:42 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) r1 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs2/binder1\x00', 0x2, 0x0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f00000000c0)=0xffffffff, 0x4) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(r1, 0x40046210, &(0x7f0000000040)=0x1) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "13bd94e32c37a3932d8ad7271907f2903ccf3bb13b387d8fdf025cdf3c8faa37a970ea456fa2fd6f8354fc3b05088269a6d5b022e392b9bd78e5e2308e054c3e2cbb6e61b42c74f3c1ba8d63d10ed85dcc5d58071547cdfd9661f05024bcf8d7722e987a76fced66d3b33373d61da648b231fe3de6f7dc9a78420b7bf0a04efb660e06f2bf671a2060d09d80f7ee6ba3ae0b6edf87d14be34012ef95719e01f065ec7943a48dcce0fcf8f7f3a89c24d940f201c7c73a3c97872a80ca25d1a3114fe16f225f4f55f3c6456cab8f0aa59d8efdc6939eb7f2b223ceff25db5222ff8e86c024229beec9ce765151d6e706fd60ab8ffe4c2e736eec4bcae53c1aaaef"}}}, 0x120) openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) (async) openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs2/binder1\x00', 0x2, 0x0) (async) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f00000000c0)=0xffffffff, 0x4) (async) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(r1, 0x40046210, &(0x7f0000000040)=0x1) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) (async) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f0000000080)) (async) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) (async) 14:44:42 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0x4) 14:44:42 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000100), 0x200, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f00000002c0)={0xc, 0x8, 0xfa00, {&(0x7f0000000140)}}, 0x10) r1 = openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) syz_io_uring_setup(0x7eff, &(0x7f0000000000)={0x0, 0x7b36, 0x9, 0x0, 0x332, 0x0, r1}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) openat$null(0xffffffffffffff9c, &(0x7f0000000100), 0x200, 0x0) (async) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f00000002c0)={0xc, 0x8, 0xfa00, {&(0x7f0000000140)}}, 0x10) (async) openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) (async) syz_io_uring_setup(0x7eff, &(0x7f0000000000)={0x0, 0x7b36, 0x9, 0x0, 0x332, 0x0, r1}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) (async) 14:44:42 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x300, 0x0, "13bd94e32c37a3932d8ad7271907f2903ccf3bb13b387d8fdf025cdf3c8faa37a970ea456fa2fd6f8354fc3b05088269a6d5b022e392b9bd78e5e2308e054c3e2cbb6e61b42c74f3c1ba8d63d10ed85dcc5d58071547cdfd9661f05024bcf8d7722e987a76fced66d3b33373d61da648b231fe3de6f7dc9a78420b7bf0a04efb660e06f2bf671a2060d09d80f7ee6ba3ae0b6edf87d14be34012ef95719e01f065ec7943a48dcce0fcf8f7f3a89c24d940f201c7c73a3c97872a80ca25d1a3114fe16f225f4f55f3c6456cab8f0aa59d8efdc6939eb7f2b223ceff25db5222ff8e86c024229beec9ce765151d6e706fd60ab8ffe4c2e736eec4bcae53c1aaaef"}}}, 0x20000260) 14:44:42 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) r1 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs2/binder1\x00', 0x2, 0x0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f00000000c0)=0xffffffff, 0x4) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(r1, 0x40046210, &(0x7f0000000040)=0x1) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) (async) openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs2/binder1\x00', 0x2, 0x0) (async) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f00000000c0)=0xffffffff, 0x4) (async) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(r1, 0x40046210, &(0x7f0000000040)=0x1) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) (async) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f0000000080)) (async) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "13bd94e32c37a3932d8ad7271907f2903ccf3bb13b387d8fdf025cdf3c8faa37a970ea456fa2fd6f8354fc3b05088269a6d5b022e392b9bd78e5e2308e054c3e2cbb6e61b42c74f3c1ba8d63d10ed85dcc5d58071547cdfd9661f05024bcf8d7722e987a76fced66d3b33373d61da648b231fe3de6f7dc9a78420b7bf0a04efb660e06f2bf671a2060d09d80f7ee6ba3ae0b6edf87d14be34012ef95719e01f065ec7943a48dcce0fcf8f7f3a89c24d940f201c7c73a3c97872a80ca25d1a3114fe16f225f4f55f3c6456cab8f0aa59d8efdc6939eb7f2b223ceff25db5222ff8e86c024229beec9ce765151d6e706fd60ab8ffe4c2e736eec4bcae53c1aaaef"}}}, 0x120) (async) 14:44:42 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0x300) 14:44:42 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "13bd94e32c37a3932d8ad7271907f2903ccf3bb13b387d8fdf025cdf3c8faa37a970ea456fa2fd6f8354fc3b05088269a6d5b022e392b9bd78e5e2308e054c3e2cbb6e61b42c74f3c1ba8d63d10ed85dcc5d58071547cdfd9661f05024bcf8d7722e987a76fced66d3b33373d61da648b231fe3de6f7dc9a78420b7bf0a04efb660e06f2bf671a2060d09d80f7ee6ba3ae0b6edf87d14be34012ef95719e01f065ec7943a48dcce0fcf8f7f3a89c24d940f201c7c73a3c97872a80ca25d1a3114fe16f225f4f55f3c6456cab8f0aa59d8efdc6939eb7f2b223ceff25db5222ff8e86c024229beec9ce765151d6e706fd60ab8ffe4c2e736eec4bcae53c1aaaef", 0x4}}}, 0x120) 14:44:42 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vxcan1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r1, 0x89f6, &(0x7f00000000c0)={'syztnl1\x00', &(0x7f0000000040)={'sit0\x00', r2, 0x2f, 0x3f, 0xa9, 0x648926d4, 0x12, @local, @empty, 0x40, 0x7, 0x5}}) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r3) r4 = inotify_init() inotify_rm_watch(r4, 0x0) fsconfig$FSCONFIG_SET_FD(r3, 0x5, &(0x7f0000000100)='\'##[),}*&):\x00', 0x0, r4) [ 3589.123738][ T4573] FAULT_INJECTION: forcing a failure. [ 3589.123738][ T4573] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3589.137039][ T4573] CPU: 0 PID: 4573 Comm: syz-executor.0 Not tainted 5.17.0-rc2-syzkaller-00167-gdcb85f85fa6f-dirty #0 [ 3589.147985][ T4573] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3589.158042][ T4573] Call Trace: [ 3589.161322][ T4573] [ 3589.164297][ T4573] dump_stack_lvl+0xd6/0x122 [ 3589.168942][ T4573] dump_stack+0x11/0x1b [ 3589.173140][ T4573] should_fail+0x23c/0x250 [ 3589.177717][ T4573] __alloc_pages+0x102/0x330 [ 3589.182396][ T4573] alloc_pages_vma+0x67e/0x810 [ 3589.187267][ T4573] ? percpu_counter_add_batch+0x109/0x130 [ 3589.193002][ T4573] shmem_getpage_gfp+0x8b4/0x12c0 [ 3589.198077][ T4573] ? do_user_addr_fault+0x7d4/0xb90 [ 3589.203280][ T4573] shmem_write_begin+0x7e/0x100 [ 3589.208168][ T4573] generic_perform_write+0x1c8/0x400 [ 3589.213460][ T4573] ? shmem_write_begin+0x100/0x100 [ 3589.218654][ T4573] __generic_file_write_iter+0xf7/0x2b0 [ 3589.224201][ T4573] ? generic_write_checks+0x242/0x290 [ 3589.229579][ T4573] generic_file_write_iter+0x75/0x130 [ 3589.234963][ T4573] vfs_write+0x7f5/0x950 [ 3589.239251][ T4573] ksys_write+0xd9/0x190 [ 3589.243543][ T4573] __x64_sys_write+0x3e/0x50 [ 3589.248283][ T4573] do_syscall_64+0x44/0xd0 [ 3589.252720][ T4573] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3589.258654][ T4573] RIP: 0033:0x7f9e8db3d059 14:44:42 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x402, 0x0, "13bd94e32c37a3932d8ad7271907f2903ccf3bb13b387d8fdf025cdf3c8faa37a970ea456fa2fd6f8354fc3b05088269a6d5b022e392b9bd78e5e2308e054c3e2cbb6e61b42c74f3c1ba8d63d10ed85dcc5d58071547cdfd9661f05024bcf8d7722e987a76fced66d3b33373d61da648b231fe3de6f7dc9a78420b7bf0a04efb660e06f2bf671a2060d09d80f7ee6ba3ae0b6edf87d14be34012ef95719e01f065ec7943a48dcce0fcf8f7f3a89c24d940f201c7c73a3c97872a80ca25d1a3114fe16f225f4f55f3c6456cab8f0aa59d8efdc6939eb7f2b223ceff25db5222ff8e86c024229beec9ce765151d6e706fd60ab8ffe4c2e736eec4bcae53c1aaaef"}}}, 0x20000260) 14:44:42 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) (async) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r1) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vxcan1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r1, 0x89f6, &(0x7f00000000c0)={'syztnl1\x00', &(0x7f0000000040)={'sit0\x00', r2, 0x2f, 0x3f, 0xa9, 0x648926d4, 0x12, @local, @empty, 0x40, 0x7, 0x5}}) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) (async) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r3) (async) r4 = inotify_init() inotify_rm_watch(r4, 0x0) (async) fsconfig$FSCONFIG_SET_FD(r3, 0x5, &(0x7f0000000100)='\'##[),}*&):\x00', 0x0, r4) [ 3589.263079][ T4573] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 3589.282760][ T4573] RSP: 002b:00007f9e8ccb3168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3589.291172][ T4573] RAX: ffffffffffffffda RBX: 00007f9e8dc4ff60 RCX: 00007f9e8db3d059 [ 3589.299151][ T4573] RDX: 0000000020000260 RSI: 0000000020000140 RDI: 0000000000000003 [ 3589.307125][ T4573] RBP: 00007f9e8ccb31d0 R08: 0000000000000000 R09: 0000000000000000 [ 3589.315101][ T4573] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 14:44:42 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0x1000000) 14:44:42 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) (async) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r1) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vxcan1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r1, 0x89f6, &(0x7f00000000c0)={'syztnl1\x00', &(0x7f0000000040)={'sit0\x00', r2, 0x2f, 0x3f, 0xa9, 0x648926d4, 0x12, @local, @empty, 0x40, 0x7, 0x5}}) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) (async) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r3) (async) r4 = inotify_init() inotify_rm_watch(r4, 0x0) (async) fsconfig$FSCONFIG_SET_FD(r3, 0x5, &(0x7f0000000100)='\'##[),}*&):\x00', 0x0, r4) 14:44:42 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "e0b3772264c43c79ea3709d20d36cc4637f10fb5de2d44e0a73f520c3612063189eaba7b99fa9556bcac2ba1fb34035db66efe1e7ea748d786f601d0dcc0875cb8313c7db8b6c64b414bd5a06373bc3fbdf80ab140bf4b8f6c4a991196664cd95bbff1abeb0e982cc9b17aac4b0381a35d7a53d098e99e432a3b2f69c8b9abd7356e7cc0700ff8a36c56bf3e8a01564cd35c263749dc7c61c59645ecda836dc9f9771ff0fcdeec9e4d22cc1722bacd35e0096e747dac83ef85aed84e433e8b13e27f70ad877ff1a53934e230ed382a6c4ff7a6c1d3bb2cee4b336dcd368e29a06ed88efe1806f129bfbdfccf6c5e3ba935eb8ad0af3928b311e0a1c89eca9c75"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x5}}}, 0x120) 14:44:42 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "13bd94e32c37a3932d8ad7271907f2903ccf3bb13b387d8fdf025cdf3c8faa37a970ea456fa2fd6f8354fc3b05088269a6d5b022e392b9bd78e5e2308e054c3e2cbb6e61b42c74f3c1ba8d63d10ed85dcc5d58071547cdfd9661f05024bcf8d7722e987a76fced66d3b33373d61da648b231fe3de6f7dc9a78420b7bf0a04efb660e06f2bf671a2060d09d80f7ee6ba3ae0b6edf87d14be34012ef95719e01f065ec7943a48dcce0fcf8f7f3a89c24d940f201c7c73a3c97872a80ca25d1a3114fe16f225f4f55f3c6456cab8f0aa59d8efdc6939eb7f2b223ceff25db5222ff8e86c024229beec9ce765151d6e706fd60ab8ffe4c2e736eec4bcae53c1aaaef"}}}, 0x20000260) (fail_nth: 31) 14:44:42 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f0000000180)={0xc, 0x8}, 0x10) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r4, 0xc}}, 0x10) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000280)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000240)=0x1, r4, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000004c0), 0x106, 0xa}}, 0x20) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r6, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r7}}, 0x10) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r3, &(0x7f0000000540)={0x5, 0x10, 0xfa00, {&(0x7f00000002c0), r7, 0x1}}, 0x18) 14:44:42 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r1) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000), 0x13f}}, 0x20) 14:44:42 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0x2000000) 14:44:42 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x8}}}, 0x120) [ 3589.323078][ T4573] R13: 00007ffe952cf46f R14: 00007f9e8ccb3300 R15: 0000000000022000 [ 3589.331068][ T4573] 14:44:42 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) (async, rerun: 32) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f0000000180)={0xc, 0x8}, 0x10) (async, rerun: 32) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async, rerun: 32) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (rerun: 32) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r4, 0xc}}, 0x10) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000280)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000240)=0x1, r4, 0x0, 0x1, 0x4}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000004c0), 0x106, 0xa}}, 0x20) (async, rerun: 64) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (rerun: 64) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async, rerun: 32) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) (rerun: 32) write$RDMA_USER_CM_CMD_NOTIFY(r6, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r7}}, 0x10) (async, rerun: 64) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r3, &(0x7f0000000540)={0x5, 0x10, 0xfa00, {&(0x7f00000002c0), r7, 0x1}}, 0x18) (rerun: 64) [ 3589.376085][ T4597] FAULT_INJECTION: forcing a failure. [ 3589.376085][ T4597] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3589.389238][ T4597] CPU: 0 PID: 4597 Comm: syz-executor.0 Not tainted 5.17.0-rc2-syzkaller-00167-gdcb85f85fa6f-dirty #0 [ 3589.400213][ T4597] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3589.410278][ T4597] Call Trace: [ 3589.413572][ T4597] [ 3589.416500][ T4597] dump_stack_lvl+0xd6/0x122 [ 3589.421138][ T4597] dump_stack+0x11/0x1b 14:44:42 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f0000000180)={0xc, 0x8}, 0x10) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r4, 0xc}}, 0x10) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000280)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000240)=0x1, r4, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000004c0), 0x106, 0xa}}, 0x20) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r6, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r7}}, 0x10) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r3, &(0x7f0000000540)={0x5, 0x10, 0xfa00, {&(0x7f00000002c0), r7, 0x1}}, 0x18) openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f0000000180)={0xc, 0x8}, 0x10) (async) openat$bsg(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r4, 0xc}}, 0x10) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000280)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000240)=0x1, r4, 0x0, 0x1, 0x4}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000004c0), 0x106, 0xa}}, 0x20) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_NOTIFY(r6, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r7}}, 0x10) (async) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r3, &(0x7f0000000540)={0x5, 0x10, 0xfa00, {&(0x7f00000002c0), r7, 0x1}}, 0x18) (async) [ 3589.425319][ T4597] should_fail+0x23c/0x250 [ 3589.429742][ T4597] should_fail_usercopy+0x16/0x20 [ 3589.434783][ T4597] copy_page_from_iter_atomic+0x2f1/0xcd0 [ 3589.440520][ T4597] ? shmem_write_begin+0x7e/0x100 [ 3589.445557][ T4597] generic_perform_write+0x211/0x400 [ 3589.450847][ T4597] ? shmem_write_begin+0x100/0x100 [ 3589.455968][ T4597] __generic_file_write_iter+0xf7/0x2b0 [ 3589.461526][ T4597] ? generic_write_checks+0x242/0x290 [ 3589.466916][ T4597] generic_file_write_iter+0x75/0x130 [ 3589.472380][ T4597] vfs_write+0x7f5/0x950 14:44:42 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x406, 0x0, "13bd94e32c37a3932d8ad7271907f2903ccf3bb13b387d8fdf025cdf3c8faa37a970ea456fa2fd6f8354fc3b05088269a6d5b022e392b9bd78e5e2308e054c3e2cbb6e61b42c74f3c1ba8d63d10ed85dcc5d58071547cdfd9661f05024bcf8d7722e987a76fced66d3b33373d61da648b231fe3de6f7dc9a78420b7bf0a04efb660e06f2bf671a2060d09d80f7ee6ba3ae0b6edf87d14be34012ef95719e01f065ec7943a48dcce0fcf8f7f3a89c24d940f201c7c73a3c97872a80ca25d1a3114fe16f225f4f55f3c6456cab8f0aa59d8efdc6939eb7f2b223ceff25db5222ff8e86c024229beec9ce765151d6e706fd60ab8ffe4c2e736eec4bcae53c1aaaef"}}}, 0x20000260) 14:44:42 executing program 4: ioctl$IMSETDEVNAME(0xffffffffffffffff, 0x80184947, &(0x7f0000000000)={0x8, 'syz0\x00'}) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r1) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000140), r0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r1, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000240)={&(0x7f0000000340)=ANY=[@ANYBLOB="f080b8542235a6d190494b5dcb9d84", @ANYRES16=r2, @ANYBLOB="08002bbd7000ffdbdf25450000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e0003000000080001007063690011000200303030303a30303a31302e300000000008008e0001000000080001007063690011000200303030303a30303a31302e300000000008008e0001000000"], 0x84}, 0x1, 0x0, 0x0, 0x800}, 0x24000810) ioctl$IMGETCOUNT(r0, 0x80044943, &(0x7f00000000c0)) r3 = openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000080)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000040)=0x1, 0xffffffffffffffff, 0x0, 0x2, 0x4}}, 0x20) write$P9_RFSYNC(0xffffffffffffffff, &(0x7f0000000180)={0x7, 0x33, 0x2}, 0x7) [ 3589.476629][ T4597] ksys_write+0xd9/0x190 [ 3589.480935][ T4597] __x64_sys_write+0x3e/0x50 [ 3589.485537][ T4597] do_syscall_64+0x44/0xd0 [ 3589.489967][ T4597] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3589.495938][ T4597] RIP: 0033:0x7f9e8db3d059 [ 3589.500351][ T4597] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 14:44:42 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) [ 3589.520231][ T4597] RSP: 002b:00007f9e8ccb3168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3589.528657][ T4597] RAX: ffffffffffffffda RBX: 00007f9e8dc4ff60 RCX: 00007f9e8db3d059 [ 3589.536633][ T4597] RDX: 0000000020000260 RSI: 0000000020000140 RDI: 0000000000000003 [ 3589.544620][ T4597] RBP: 00007f9e8ccb31d0 R08: 0000000000000000 R09: 0000000000000000 [ 3589.552680][ T4597] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3589.560668][ T4597] R13: 00007ffe952cf46f R14: 00007f9e8ccb3300 R15: 0000000000022000 [ 3589.568790][ T4597] 14:44:42 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x20000260) (fail_nth: 32) 14:44:42 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) (async) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) (async) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r1) (async, rerun: 64) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000), 0x13f}}, 0x20) (rerun: 64) 14:44:42 executing program 4: ioctl$IMSETDEVNAME(0xffffffffffffffff, 0x80184947, &(0x7f0000000000)={0x8, 'syz0\x00'}) (async, rerun: 64) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) (rerun: 64) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r0) (async) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r1) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000140), r0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r1, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000240)={&(0x7f0000000340)=ANY=[@ANYBLOB="f080b8542235a6d190494b5dcb9d84", @ANYRES16=r2, @ANYBLOB="08002bbd7000ffdbdf25450000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e0003000000080001007063690011000200303030303a30303a31302e300000000008008e0001000000080001007063690011000200303030303a30303a31302e300000000008008e0001000000"], 0x84}, 0x1, 0x0, 0x0, 0x800}, 0x24000810) (async, rerun: 64) ioctl$IMGETCOUNT(r0, 0x80044943, &(0x7f00000000c0)) (async, rerun: 64) r3 = openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000080)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000040)=0x1, 0xffffffffffffffff, 0x0, 0x2, 0x4}}, 0x20) (async) write$P9_RFSYNC(0xffffffffffffffff, &(0x7f0000000180)={0x7, 0x33, 0x2}, 0x7) 14:44:42 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x2}}}, 0x120) 14:44:42 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0x3000000) 14:44:42 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x408, 0x0, "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"}}}, 0x20000260) 14:44:42 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) (async) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r1) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000), 0x13f}}, 0x20) 14:44:42 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0x4000000) 14:44:42 executing program 4: ioctl$IMSETDEVNAME(0xffffffffffffffff, 0x80184947, &(0x7f0000000000)={0x8, 'syz0\x00'}) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r0) (async) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r1) (async) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000140), r0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r1, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000240)={&(0x7f0000000340)=ANY=[@ANYBLOB="f080b8542235a6d190494b5dcb9d84", @ANYRES16=r2, @ANYBLOB="08002bbd7000ffdbdf25450000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e0003000000080001007063690011000200303030303a30303a31302e300000000008008e0001000000080001007063690011000200303030303a30303a31302e300000000008008e0001000000"], 0x84}, 0x1, 0x0, 0x0, 0x800}, 0x24000810) (async) ioctl$IMGETCOUNT(r0, 0x80044943, &(0x7f00000000c0)) r3 = openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000080)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000040)=0x1, 0xffffffffffffffff, 0x0, 0x2, 0x4}}, 0x20) (async, rerun: 32) write$P9_RFSYNC(0xffffffffffffffff, &(0x7f0000000180)={0x7, 0x33, 0x2}, 0x7) (rerun: 32) [ 3589.730901][ T4648] FAULT_INJECTION: forcing a failure. [ 3589.730901][ T4648] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3589.744264][ T4648] CPU: 1 PID: 4648 Comm: syz-executor.0 Not tainted 5.17.0-rc2-syzkaller-00167-gdcb85f85fa6f-dirty #0 [ 3589.755249][ T4648] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3589.765363][ T4648] Call Trace: [ 3589.768646][ T4648] [ 3589.771609][ T4648] dump_stack_lvl+0xd6/0x122 [ 3589.776256][ T4648] dump_stack+0x11/0x1b 14:44:42 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x3}}}, 0x120) 14:44:42 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x4}}}, 0x120) 14:44:42 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0x7fffffffffffe) [ 3589.780425][ T4648] should_fail+0x23c/0x250 [ 3589.784846][ T4648] __alloc_pages+0x102/0x330 [ 3589.789439][ T4648] alloc_pages_vma+0x67e/0x810 [ 3589.794237][ T4648] ? percpu_counter_add_batch+0x109/0x130 [ 3589.799965][ T4648] shmem_getpage_gfp+0x8b4/0x12c0 [ 3589.805063][ T4648] ? do_user_addr_fault+0x7d4/0xb90 [ 3589.810282][ T4648] shmem_write_begin+0x7e/0x100 [ 3589.815188][ T4648] generic_perform_write+0x1c8/0x400 [ 3589.820484][ T4648] ? shmem_write_begin+0x100/0x100 [ 3589.825607][ T4648] __generic_file_write_iter+0xf7/0x2b0 [ 3589.831194][ T4648] ? generic_write_checks+0x242/0x290 [ 3589.836632][ T4648] generic_file_write_iter+0x75/0x130 [ 3589.842162][ T4648] vfs_write+0x7f5/0x950 [ 3589.846413][ T4648] ksys_write+0xd9/0x190 [ 3589.850727][ T4648] __x64_sys_write+0x3e/0x50 [ 3589.855323][ T4648] do_syscall_64+0x44/0xd0 [ 3589.859749][ T4648] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3589.865647][ T4648] RIP: 0033:0x7f9e8db3d059 [ 3589.870090][ T4648] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 3589.889984][ T4648] RSP: 002b:00007f9e8ccb3168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3589.898407][ T4648] RAX: ffffffffffffffda RBX: 00007f9e8dc4ff60 RCX: 00007f9e8db3d059 [ 3589.906379][ T4648] RDX: 0000000020000260 RSI: 0000000020000140 RDI: 0000000000000003 [ 3589.914356][ T4648] RBP: 00007f9e8ccb31d0 R08: 0000000000000000 R09: 0000000000000000 [ 3589.922335][ T4648] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 14:44:43 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x20000260) (fail_nth: 33) 14:44:43 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_REJECT(0xffffffffffffffff, &(0x7f00000003c0)={0x9, 0x10dba82a82bb4c6d, 0xfa00, {0xffffffffffffffff, 0x0, '\x00', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x9, 0x0, "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"}}}, 0x120) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r3}}, 0x10) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000000)={0x6, 0x118, 0xfa00, {{0x200, 0x9, "22df540bc95815ab6faf6540450ba32849404fbdf08b36d84d6c517599e6d4eaf35c202a935c109c07494ec14167954533c260dcaf0460a1184382a74244fb36639a407f3da1ee7bc6da4e789a127c62e232ee9b9da07295248ee5078963e90db2abc339e4d51ade1c61d96bf3f54bf9aaf8085e5f43232d4dd76182961d4a174d7816f998b4b800de9dc0109b2273ec2400c8fc7c0ab48a611c43f60f16a9d1c4710b1b8e7d9f2dc86f57f6f581b959f7153321c3320a290284fa4bec927ae1254173028ba1ee232bdd84daec7f89c0eda4770a83763a8ab75468cc03eb875b3e6b0dc7bb944eaaaec84e2b516fbd819ff300", 0x6, 0x0, 0x80, 0x3, 0x5, 0xe9, 0x3, 0x9}, r3}}, 0x120) 14:44:43 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x500, 0x0, "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"}}}, 0x20000260) 14:44:43 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x5}}}, 0x120) 14:44:43 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f0000000180)={0xc, 0x8}, 0x10) 14:44:43 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0x100000000000000) [ 3589.930317][ T4648] R13: 00007ffe952cf46f R14: 00007f9e8ccb3300 R15: 0000000000022000 [ 3589.938299][ T4648] [ 3589.975299][ T4675] FAULT_INJECTION: forcing a failure. [ 3589.975299][ T4675] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3589.988428][ T4675] CPU: 0 PID: 4675 Comm: syz-executor.0 Not tainted 5.17.0-rc2-syzkaller-00167-gdcb85f85fa6f-dirty #0 [ 3589.999372][ T4675] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3590.009537][ T4675] Call Trace: [ 3590.012900][ T4675] [ 3590.015830][ T4675] dump_stack_lvl+0xd6/0x122 [ 3590.020429][ T4675] dump_stack+0x11/0x1b [ 3590.024710][ T4675] should_fail+0x23c/0x250 [ 3590.029201][ T4675] should_fail_usercopy+0x16/0x20 [ 3590.034325][ T4675] copy_page_from_iter_atomic+0x2f1/0xcd0 [ 3590.040232][ T4675] ? shmem_write_begin+0x7e/0x100 [ 3590.045272][ T4675] generic_perform_write+0x211/0x400 [ 3590.050560][ T4675] ? shmem_write_begin+0x100/0x100 [ 3590.055715][ T4675] __generic_file_write_iter+0xf7/0x2b0 [ 3590.061263][ T4675] ? generic_write_checks+0x242/0x290 [ 3590.066639][ T4675] generic_file_write_iter+0x75/0x130 [ 3590.072071][ T4675] vfs_write+0x7f5/0x950 [ 3590.076358][ T4675] ksys_write+0xd9/0x190 [ 3590.080596][ T4675] __x64_sys_write+0x3e/0x50 [ 3590.085186][ T4675] do_syscall_64+0x44/0xd0 [ 3590.089611][ T4675] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3590.095520][ T4675] RIP: 0033:0x7f9e8db3d059 [ 3590.100037][ T4675] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 14:44:43 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_REJECT(0xffffffffffffffff, &(0x7f00000003c0)={0x9, 0x10dba82a82bb4c6d, 0xfa00, {0xffffffffffffffff, 0x0, '\x00', "e0b3772264c43c79ea3709d20d36cc4637f10fb5de2d44e0a73f520c3612063189eaba7b99fa9556bcac2ba1fb34035db66efe1e7ea748d786f601d0dcc0875cb8313c7db8b6c64b414bd5a06373bc3fbdf80ab140bf4b8f6c4a991196664cd95bbff1abeb0e982cc9b17aac4b0381a35d7a53d098e99e432a3b2f69c8b9abd7356e7cc0700ff8a36c56bf3e8a01564cd35c263749dc7c61c59645ecda836dc9f9771ff0fcdeec9e4d22cc1722bacd35e0096e747dac83ef85aed84e433e8b13e27f70ad877ff1a53934e230ed382a6c4ff7a6c1d3bb2cee4b336dcd368e29a06ed88efe1806f129bfbdfccf6c5e3ba935eb8ad0af3928b311e0a1c89eca9c75"}}, 0x110) (async) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x9, 0x0, "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"}}}, 0x120) (async) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r3}}, 0x10) (async) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000000)={0x6, 0x118, 0xfa00, {{0x200, 0x9, "22df540bc95815ab6faf6540450ba32849404fbdf08b36d84d6c517599e6d4eaf35c202a935c109c07494ec14167954533c260dcaf0460a1184382a74244fb36639a407f3da1ee7bc6da4e789a127c62e232ee9b9da07295248ee5078963e90db2abc339e4d51ade1c61d96bf3f54bf9aaf8085e5f43232d4dd76182961d4a174d7816f998b4b800de9dc0109b2273ec2400c8fc7c0ab48a611c43f60f16a9d1c4710b1b8e7d9f2dc86f57f6f581b959f7153321c3320a290284fa4bec927ae1254173028ba1ee232bdd84daec7f89c0eda4770a83763a8ab75468cc03eb875b3e6b0dc7bb944eaaaec84e2b516fbd819ff300", 0x6, 0x0, 0x80, 0x3, 0x5, 0xe9, 0x3, 0x9}, r3}}, 0x120) 14:44:43 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x8}}}, 0x120) 14:44:43 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f0000000180)={0xc, 0x8}, 0x10) 14:44:43 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0x200000000000000) 14:44:43 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x600, 0x0, "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"}}}, 0x20000260) 14:44:43 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_REJECT(0xffffffffffffffff, &(0x7f00000003c0)={0x9, 0x10dba82a82bb4c6d, 0xfa00, {0xffffffffffffffff, 0x0, '\x00', "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"}}, 0x110) (async) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x9, 0x0, "13bd94e32c37a3932d8ad7271907f2903ccf3bb13b387d8fdf025cdf3c8faa37a970ea456fa2fd6f8354fc3b05088269a6d5b022e392b9bd78e5e2308e054c3e2cbb6e61b42c74f3c1ba8d63d10ed85dcc5d58071547cdfd9661f05024bcf8d7722e987a76fced66d3b33373d61da648b231fe3de6f7dc9a78420b7bf0a04efb660e06f2bf671a2060d09d80f7ee6ba3ae0b6edf87d14be34012ef95719e01f065ec7943a48dcce0fcf8f7f3a89c24d940f201c7c73a3c97872a80ca25d1a3114fe16f225f4f55f3c6456cab8f0aa59d8efdc6939eb7f2b223ceff25db5222ff8e86c024229beec9ce765151d6e706fd60ab8ffe4c2e736eec4bcae53c1aaaef"}}}, 0x120) (async) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r3}}, 0x10) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000000)={0x6, 0x118, 0xfa00, {{0x200, 0x9, "22df540bc95815ab6faf6540450ba32849404fbdf08b36d84d6c517599e6d4eaf35c202a935c109c07494ec14167954533c260dcaf0460a1184382a74244fb36639a407f3da1ee7bc6da4e789a127c62e232ee9b9da07295248ee5078963e90db2abc339e4d51ade1c61d96bf3f54bf9aaf8085e5f43232d4dd76182961d4a174d7816f998b4b800de9dc0109b2273ec2400c8fc7c0ab48a611c43f60f16a9d1c4710b1b8e7d9f2dc86f57f6f581b959f7153321c3320a290284fa4bec927ae1254173028ba1ee232bdd84daec7f89c0eda4770a83763a8ab75468cc03eb875b3e6b0dc7bb944eaaaec84e2b516fbd819ff300", 0x6, 0x0, 0x80, 0x3, 0x5, 0xe9, 0x3, 0x9}, r3}}, 0x120) [ 3590.119861][ T4675] RSP: 002b:00007f9e8ccb3168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3590.128385][ T4675] RAX: ffffffffffffffda RBX: 00007f9e8dc4ff60 RCX: 00007f9e8db3d059 [ 3590.136361][ T4675] RDX: 0000000020000260 RSI: 0000000020000140 RDI: 0000000000000003 [ 3590.144357][ T4675] RBP: 00007f9e8ccb31d0 R08: 0000000000000000 R09: 0000000000000000 [ 3590.152410][ T4675] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3590.160380][ T4675] R13: 00007ffe952cf46f R14: 00007f9e8ccb3300 R15: 0000000000022000 [ 3590.168352][ T4675] 14:44:43 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "13bd94e32c37a3932d8ad7271907f2903ccf3bb13b387d8fdf025cdf3c8faa37a970ea456fa2fd6f8354fc3b05088269a6d5b022e392b9bd78e5e2308e054c3e2cbb6e61b42c74f3c1ba8d63d10ed85dcc5d58071547cdfd9661f05024bcf8d7722e987a76fced66d3b33373d61da648b231fe3de6f7dc9a78420b7bf0a04efb660e06f2bf671a2060d09d80f7ee6ba3ae0b6edf87d14be34012ef95719e01f065ec7943a48dcce0fcf8f7f3a89c24d940f201c7c73a3c97872a80ca25d1a3114fe16f225f4f55f3c6456cab8f0aa59d8efdc6939eb7f2b223ceff25db5222ff8e86c024229beec9ce765151d6e706fd60ab8ffe4c2e736eec4bcae53c1aaaef"}}}, 0x20000260) (fail_nth: 34) 14:44:43 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) 14:44:43 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f0000000180)={0xc, 0x8}, 0x10) 14:44:43 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0x300000000000000) 14:44:43 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x4, 0x0, 0x0, 0xfe}}}, 0x120) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r1) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r2) write$RDMA_USER_CM_CMD_MIGRATE_ID(r2, &(0x7f0000000100)={0x12, 0x10, 0xfa00, {&(0x7f00000000c0), 0xffffffffffffffff, r1}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x2, 0x2}}, 0x20) arch_prctl$ARCH_GET_CPUID(0x1011) 14:44:43 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x604, 0x0, "13bd94e32c37a3932d8ad7271907f2903ccf3bb13b387d8fdf025cdf3c8faa37a970ea456fa2fd6f8354fc3b05088269a6d5b022e392b9bd78e5e2308e054c3e2cbb6e61b42c74f3c1ba8d63d10ed85dcc5d58071547cdfd9661f05024bcf8d7722e987a76fced66d3b33373d61da648b231fe3de6f7dc9a78420b7bf0a04efb660e06f2bf671a2060d09d80f7ee6ba3ae0b6edf87d14be34012ef95719e01f065ec7943a48dcce0fcf8f7f3a89c24d940f201c7c73a3c97872a80ca25d1a3114fe16f225f4f55f3c6456cab8f0aa59d8efdc6939eb7f2b223ceff25db5222ff8e86c024229beec9ce765151d6e706fd60ab8ffe4c2e736eec4bcae53c1aaaef"}}}, 0x20000260) 14:44:43 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "e0b3772264c43c79ea3709d20d36cc4637f10fb5de2d44e0a73f520c3612063189eaba7b99fa9556bcac2ba1fb34035db66efe1e7ea748d786f601d0dcc0875cb8313c7db8b6c64b414bd5a06373bc3fbdf80ab140bf4b8f6c4a991196664cd95bbff1abeb0e982cc9b17aac4b0381a35d7a53d098e99e432a3b2f69c8b9abd7356e7cc0700ff8a36c56bf3e8a01564cd35c263749dc7c61c59645ecda836dc9f9771ff0fcdeec9e4d22cc1722bacd35e0096e747dac83ef85aed84e433e8b13e27f70ad877ff1a53934e230ed382a6c4ff7a6c1d3bb2cee4b336dcd368e29a06ed88efe1806f129bfbdfccf6c5e3ba935eb8ad0af3928b311e0a1c89eca9c75"}}, 0x110) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x4, 0x0, 0x0, 0xfe}}}, 0x120) (async) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r1) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r2) (async) write$RDMA_USER_CM_CMD_MIGRATE_ID(r2, &(0x7f0000000100)={0x12, 0x10, 0xfa00, {&(0x7f00000000c0), 0xffffffffffffffff, r1}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x2, 0x2}}, 0x20) (async) arch_prctl$ARCH_GET_CPUID(0x1011) 14:44:43 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0x400000000000000) 14:44:43 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "e0b3772264c43c79ea3709d20d36cc4637f10fb5de2d44e0a73f520c3612063189eaba7b99fa9556bcac2ba1fb34035db66efe1e7ea748d786f601d0dcc0875cb8313c7db8b6c64b414bd5a06373bc3fbdf80ab140bf4b8f6c4a991196664cd95bbff1abeb0e982cc9b17aac4b0381a35d7a53d098e99e432a3b2f69c8b9abd7356e7cc0700ff8a36c56bf3e8a01564cd35c263749dc7c61c59645ecda836dc9f9771ff0fcdeec9e4d22cc1722bacd35e0096e747dac83ef85aed84e433e8b13e27f70ad877ff1a53934e230ed382a6c4ff7a6c1d3bb2cee4b336dcd368e29a06ed88efe1806f129bfbdfccf6c5e3ba935eb8ad0af3928b311e0a1c89eca9c75"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x2}}}, 0x120) 14:44:43 executing program 4: r0 = io_uring_setup(0x1912, &(0x7f0000000000)={0x0, 0xb13, 0x20, 0x0, 0x323}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0xee00, 0xee00}}, './file0\x00'}) write$P9_RXATTRCREATE(r1, &(0x7f0000000140)={0x7, 0x21, 0x2}, 0x7) r2 = syz_genetlink_get_family_id$devlink(&(0x7f00000001c0), r1) sendmsg$DEVLINK_CMD_SB_OCC_SNAPSHOT(r1, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000200)={0xa8, r2, 0x400, 0x70bd25, 0x25dfdbfd, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0xb, 0xa3e00000}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x3ff}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x7}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0xfffff801}}]}, 0xa8}, 0x1, 0x0, 0x0, 0x840}, 0x4004) r3 = inotify_init() inotify_rm_watch(r3, 0x0) r4 = inotify_init() inotify_rm_watch(r4, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(r0, 0x6, &(0x7f00000000c0)={0x5a7a, 0x0, &(0x7f0000000080)=[r3, r4]}, 0x2) io_setup(0x20, &(0x7f0000000340)) openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) [ 3590.338634][ T4704] FAULT_INJECTION: forcing a failure. [ 3590.338634][ T4704] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3590.351941][ T4704] CPU: 0 PID: 4704 Comm: syz-executor.0 Not tainted 5.17.0-rc2-syzkaller-00167-gdcb85f85fa6f-dirty #0 [ 3590.362909][ T4704] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3590.372969][ T4704] Call Trace: [ 3590.376244][ T4704] [ 3590.379169][ T4704] dump_stack_lvl+0xd6/0x122 [ 3590.383843][ T4704] dump_stack+0x11/0x1b [ 3590.388005][ T4704] should_fail+0x23c/0x250 [ 3590.392559][ T4704] __alloc_pages+0x102/0x330 [ 3590.397155][ T4704] alloc_pages_vma+0x67e/0x810 [ 3590.401917][ T4704] ? percpu_counter_add_batch+0x109/0x130 [ 3590.407676][ T4704] shmem_getpage_gfp+0x8b4/0x12c0 [ 3590.412735][ T4704] ? do_user_addr_fault+0x7d4/0xb90 [ 3590.417955][ T4704] shmem_write_begin+0x7e/0x100 [ 3590.422832][ T4704] generic_perform_write+0x1c8/0x400 [ 3590.428175][ T4704] ? shmem_write_begin+0x100/0x100 [ 3590.433336][ T4704] __generic_file_write_iter+0xf7/0x2b0 [ 3590.438960][ T4704] ? generic_write_checks+0x242/0x290 [ 3590.444338][ T4704] generic_file_write_iter+0x75/0x130 [ 3590.449712][ T4704] vfs_write+0x7f5/0x950 [ 3590.453959][ T4704] ksys_write+0xd9/0x190 [ 3590.458288][ T4704] __x64_sys_write+0x3e/0x50 [ 3590.462878][ T4704] do_syscall_64+0x44/0xd0 [ 3590.467293][ T4704] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3590.473187][ T4704] RIP: 0033:0x7f9e8db3d059 14:44:43 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x804, 0x0, "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"}}}, 0x20000260) 14:44:43 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0xfeffffffffff0700) [ 3590.477591][ T4704] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 3590.497233][ T4704] RSP: 002b:00007f9e8ccb3168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3590.505649][ T4704] RAX: ffffffffffffffda RBX: 00007f9e8dc4ff60 RCX: 00007f9e8db3d059 [ 3590.513724][ T4704] RDX: 0000000020000260 RSI: 0000000020000140 RDI: 0000000000000003 [ 3590.521722][ T4704] RBP: 00007f9e8ccb31d0 R08: 0000000000000000 R09: 0000000000000000 [ 3590.529699][ T4704] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 14:44:43 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "13bd94e32c37a3932d8ad7271907f2903ccf3bb13b387d8fdf025cdf3c8faa37a970ea456fa2fd6f8354fc3b05088269a6d5b022e392b9bd78e5e2308e054c3e2cbb6e61b42c74f3c1ba8d63d10ed85dcc5d58071547cdfd9661f05024bcf8d7722e987a76fced66d3b33373d61da648b231fe3de6f7dc9a78420b7bf0a04efb660e06f2bf671a2060d09d80f7ee6ba3ae0b6edf87d14be34012ef95719e01f065ec7943a48dcce0fcf8f7f3a89c24d940f201c7c73a3c97872a80ca25d1a3114fe16f225f4f55f3c6456cab8f0aa59d8efdc6939eb7f2b223ceff25db5222ff8e86c024229beec9ce765151d6e706fd60ab8ffe4c2e736eec4bcae53c1aaaef"}}}, 0x20000260) (fail_nth: 35) 14:44:43 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x3}}}, 0x120) 14:44:43 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "e0b3772264c43c79ea3709d20d36cc4637f10fb5de2d44e0a73f520c3612063189eaba7b99fa9556bcac2ba1fb34035db66efe1e7ea748d786f601d0dcc0875cb8313c7db8b6c64b414bd5a06373bc3fbdf80ab140bf4b8f6c4a991196664cd95bbff1abeb0e982cc9b17aac4b0381a35d7a53d098e99e432a3b2f69c8b9abd7356e7cc0700ff8a36c56bf3e8a01564cd35c263749dc7c61c59645ecda836dc9f9771ff0fcdeec9e4d22cc1722bacd35e0096e747dac83ef85aed84e433e8b13e27f70ad877ff1a53934e230ed382a6c4ff7a6c1d3bb2cee4b336dcd368e29a06ed88efe1806f129bfbdfccf6c5e3ba935eb8ad0af3928b311e0a1c89eca9c75"}}, 0x110) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "13bd94e32c37a3932d8ad7271907f2903ccf3bb13b387d8fdf025cdf3c8faa37a970ea456fa2fd6f8354fc3b05088269a6d5b022e392b9bd78e5e2308e054c3e2cbb6e61b42c74f3c1ba8d63d10ed85dcc5d58071547cdfd9661f05024bcf8d7722e987a76fced66d3b33373d61da648b231fe3de6f7dc9a78420b7bf0a04efb660e06f2bf671a2060d09d80f7ee6ba3ae0b6edf87d14be34012ef95719e01f065ec7943a48dcce0fcf8f7f3a89c24d940f201c7c7293c97872a80ca25d1a3114fe16f225f4f55f3c6456cab8f0aa59d8efdc6939eb7f2b223ceff25db5222ff8f86c024229beec9ce765151d6e706fd60ab8ffe4c2e736eec4bcae53c1aaaef", 0x0, 0x4, 0x0, 0x0, 0xfe}}}, 0x120) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r1) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r2) write$RDMA_USER_CM_CMD_MIGRATE_ID(r2, &(0x7f0000000100)={0x12, 0x10, 0xfa00, {&(0x7f00000000c0), 0xffffffffffffffff, r1}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x2, 0x2}}, 0x20) arch_prctl$ARCH_GET_CPUID(0x1011) openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) (async) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x4, 0x0, 0x0, 0xfe}}}, 0x120) (async) openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) (async) syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r1) (async) openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) (async) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r2) (async) write$RDMA_USER_CM_CMD_MIGRATE_ID(r2, &(0x7f0000000100)={0x12, 0x10, 0xfa00, {&(0x7f00000000c0), 0xffffffffffffffff, r1}}, 0x18) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x2, 0x2}}, 0x20) (async) arch_prctl$ARCH_GET_CPUID(0x1011) (async) 14:44:43 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) syz_io_uring_setup(0x1c6c, &(0x7f0000000000)={0x0, 0x9bd8, 0x2, 0x0, 0x2f6, 0x0, r0}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) r1 = socket$pptp(0x18, 0x1, 0x2) connect$pptp(r1, &(0x7f0000000100)={0x18, 0x2, {0x2, @local}}, 0x1e) 14:44:43 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x4}}}, 0x120) [ 3590.537702][ T4704] R13: 00007ffe952cf46f R14: 00007f9e8ccb3300 R15: 0000000000022000 [ 3590.545684][ T4704] 14:44:43 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r1) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r2) ioctl$SG_NEXT_CMD_LEN(r2, 0x2283, &(0x7f0000000100)=0xf0) write$selinux_attr(r1, &(0x7f0000000000)='system_u:object_r:event_device_t:s0\x00', 0x24) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r3) r4 = syz_genetlink_get_family_id$devlink(&(0x7f0000000340), r0) sendmsg$DEVLINK_CMD_RATE_SET(r2, &(0x7f0000000580)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)={0x64, r4, 0x2, 0x70bd28, 0x25dfdbfd, {}, [@DEVLINK_ATTR_RATE_TX_SHARE={0xc, 0xa6, 0x5}, @DEVLINK_ATTR_RATE_NODE_NAME={0xf, 0xa8, @name2}, @DEVLINK_ATTR_RATE_TX_MAX={0xc}, @DEVLINK_ATTR_RATE_NODE_NAME={0xf, 0xa8, @name2}, @DEVLINK_ATTR_RATE_TX_MAX={0xc, 0xa7, 0x3}, @DEVLINK_ATTR_RATE_TX_MAX={0xc, 0xa7, 0x7}]}, 0x64}, 0x1, 0x0, 0x0, 0x4800}, 0x4008000) r5 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r5) io_uring_register$IORING_UNREGISTER_EVENTFD(r5, 0x5, 0x0, 0x0) r6 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/fscreate\x00', 0x2, 0x0) r7 = inotify_init() inotify_rm_watch(r7, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(r3, 0x6, &(0x7f00000000c0)={0x800, 0x0, &(0x7f0000000080)=[r6, r1, r7, r1]}, 0x4) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) 14:44:43 executing program 4: r0 = io_uring_setup(0x1912, &(0x7f0000000000)={0x0, 0xb13, 0x20, 0x0, 0x323}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0xee00, 0xee00}}, './file0\x00'}) write$P9_RXATTRCREATE(r1, &(0x7f0000000140)={0x7, 0x21, 0x2}, 0x7) (async) r2 = syz_genetlink_get_family_id$devlink(&(0x7f00000001c0), r1) sendmsg$DEVLINK_CMD_SB_OCC_SNAPSHOT(r1, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000200)={0xa8, r2, 0x400, 0x70bd25, 0x25dfdbfd, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0xb, 0xa3e00000}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x3ff}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x7}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0xfffff801}}]}, 0xa8}, 0x1, 0x0, 0x0, 0x840}, 0x4004) (async) r3 = inotify_init() inotify_rm_watch(r3, 0x0) (async) r4 = inotify_init() inotify_rm_watch(r4, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(r0, 0x6, &(0x7f00000000c0)={0x5a7a, 0x0, &(0x7f0000000080)=[r3, r4]}, 0x2) (async) io_setup(0x20, &(0x7f0000000340)) (async) openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) 14:44:43 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) syz_io_uring_setup(0x1c6c, &(0x7f0000000000)={0x0, 0x9bd8, 0x2, 0x0, 0x2f6, 0x0, r0}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) (async) r1 = socket$pptp(0x18, 0x1, 0x2) connect$pptp(r1, &(0x7f0000000100)={0x18, 0x2, {0x2, @local}}, 0x1e) [ 3590.595383][ T4736] FAULT_INJECTION: forcing a failure. [ 3590.595383][ T4736] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3590.608509][ T4736] CPU: 0 PID: 4736 Comm: syz-executor.0 Not tainted 5.17.0-rc2-syzkaller-00167-gdcb85f85fa6f-dirty #0 [ 3590.619449][ T4736] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3590.629509][ T4736] Call Trace: [ 3590.632787][ T4736] [ 3590.635715][ T4736] dump_stack_lvl+0xd6/0x122 [ 3590.640346][ T4736] dump_stack+0x11/0x1b 14:44:43 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0xc00, 0x0, "13bd94e32c37a3932d8ad7271907f2903ccf3bb13b387d8fdf025cdf3c8faa37a970ea456fa2fd6f8354fc3b05088269a6d5b022e392b9bd78e5e2308e054c3e2cbb6e61b42c74f3c1ba8d63d10ed85dcc5d58071547cdfd9661f05024bcf8d7722e987a76fced66d3b33373d61da648b231fe3de6f7dc9a78420b7bf0a04efb660e06f2bf671a2060d09d80f7ee6ba3ae0b6edf87d14be34012ef95719e01f065ec7943a48dcce0fcf8f7f3a89c24d940f201c7c73a3c97872a80ca25d1a3114fe16f225f4f55f3c6456cab8f0aa59d8efdc6939eb7f2b223ceff25db5222ff8e86c024229beec9ce765151d6e706fd60ab8ffe4c2e736eec4bcae53c1aaaef"}}}, 0x20000260) 14:44:43 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) (async) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r1) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r2) ioctl$SG_NEXT_CMD_LEN(r2, 0x2283, &(0x7f0000000100)=0xf0) (async) write$selinux_attr(r1, &(0x7f0000000000)='system_u:object_r:event_device_t:s0\x00', 0x24) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r3) (async) r4 = syz_genetlink_get_family_id$devlink(&(0x7f0000000340), r0) sendmsg$DEVLINK_CMD_RATE_SET(r2, &(0x7f0000000580)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)={0x64, r4, 0x2, 0x70bd28, 0x25dfdbfd, {}, [@DEVLINK_ATTR_RATE_TX_SHARE={0xc, 0xa6, 0x5}, @DEVLINK_ATTR_RATE_NODE_NAME={0xf, 0xa8, @name2}, @DEVLINK_ATTR_RATE_TX_MAX={0xc}, @DEVLINK_ATTR_RATE_NODE_NAME={0xf, 0xa8, @name2}, @DEVLINK_ATTR_RATE_TX_MAX={0xc, 0xa7, 0x3}, @DEVLINK_ATTR_RATE_TX_MAX={0xc, 0xa7, 0x7}]}, 0x64}, 0x1, 0x0, 0x0, 0x4800}, 0x4008000) (async) r5 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r5) io_uring_register$IORING_UNREGISTER_EVENTFD(r5, 0x5, 0x0, 0x0) r6 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/fscreate\x00', 0x2, 0x0) (async) r7 = inotify_init() inotify_rm_watch(r7, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(r3, 0x6, &(0x7f00000000c0)={0x800, 0x0, &(0x7f0000000080)=[r6, r1, r7, r1]}, 0x4) (async) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) [ 3590.644499][ T4736] should_fail+0x23c/0x250 [ 3590.648913][ T4736] should_fail_usercopy+0x16/0x20 [ 3590.653943][ T4736] copy_page_from_iter_atomic+0x2f1/0xcd0 [ 3590.659667][ T4736] ? shmem_write_begin+0x7e/0x100 [ 3590.664828][ T4736] generic_perform_write+0x211/0x400 [ 3590.670174][ T4736] ? shmem_write_begin+0x100/0x100 [ 3590.675433][ T4736] __generic_file_write_iter+0xf7/0x2b0 [ 3590.680996][ T4736] ? generic_write_checks+0x242/0x290 [ 3590.686431][ T4736] generic_file_write_iter+0x75/0x130 14:44:43 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "13bd94e32c37a3932d8ad7271907f2903ccf3bb13b387d8fdf025cdf3c8faa37a970ea456fa2fd6f8354fc3b05088269a6d5b022e392b9bd78e5e2308e054c3e2cbb6e61b42c74f3c1ba8d63d10ed85dcc5d58071547cdfd9661f05024bcf8d7722e987a76fced66d3b33373d61da648b231fe3de6f7dc9a78420b7bf0a04efb660e06f2bf671a2060d09d80f7ee6ba3ae0b6edf87d14be34012ef95719e01f065ec7943a48dcce0fcf8f7f3a89c24d940f201c7c73a3c97872a80ca25d1a3114fe16f225f4f55f3c6456cab8f0aa59d8efdc6939eb7f2b223ceff25db5222ff8e86c024229beec9ce765151d6e706fd60ab8ffe4c2e736eec4bcae53c1aaaef", 0x0, 0x0, 0x5}}}, 0x120) 14:44:43 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r1) (async) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r2) (async) ioctl$SG_NEXT_CMD_LEN(r2, 0x2283, &(0x7f0000000100)=0xf0) write$selinux_attr(r1, &(0x7f0000000000)='system_u:object_r:event_device_t:s0\x00', 0x24) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) (async) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r3) r4 = syz_genetlink_get_family_id$devlink(&(0x7f0000000340), r0) sendmsg$DEVLINK_CMD_RATE_SET(r2, &(0x7f0000000580)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)={0x64, r4, 0x2, 0x70bd28, 0x25dfdbfd, {}, [@DEVLINK_ATTR_RATE_TX_SHARE={0xc, 0xa6, 0x5}, @DEVLINK_ATTR_RATE_NODE_NAME={0xf, 0xa8, @name2}, @DEVLINK_ATTR_RATE_TX_MAX={0xc}, @DEVLINK_ATTR_RATE_NODE_NAME={0xf, 0xa8, @name2}, @DEVLINK_ATTR_RATE_TX_MAX={0xc, 0xa7, 0x3}, @DEVLINK_ATTR_RATE_TX_MAX={0xc, 0xa7, 0x7}]}, 0x64}, 0x1, 0x0, 0x0, 0x4800}, 0x4008000) (async) r5 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r5) (async) io_uring_register$IORING_UNREGISTER_EVENTFD(r5, 0x5, 0x0, 0x0) (async) r6 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/fscreate\x00', 0x2, 0x0) (async) r7 = inotify_init() inotify_rm_watch(r7, 0x0) (async) io_uring_register$IORING_REGISTER_FILES_UPDATE(r3, 0x6, &(0x7f00000000c0)={0x800, 0x0, &(0x7f0000000080)=[r6, r1, r7, r1]}, 0x4) (async) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) [ 3590.691909][ T4736] vfs_write+0x7f5/0x950 [ 3590.696325][ T4736] ksys_write+0xd9/0x190 [ 3590.700577][ T4736] __x64_sys_write+0x3e/0x50 [ 3590.705258][ T4736] do_syscall_64+0x44/0xd0 [ 3590.709684][ T4736] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3590.715591][ T4736] RIP: 0033:0x7f9e8db3d059 [ 3590.720027][ T4736] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 3590.739684][ T4736] RSP: 002b:00007f9e8ccb3168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3590.748117][ T4736] RAX: ffffffffffffffda RBX: 00007f9e8dc4ff60 RCX: 00007f9e8db3d059 [ 3590.756093][ T4736] RDX: 0000000020000260 RSI: 0000000020000140 RDI: 0000000000000003 [ 3590.764135][ T4736] RBP: 00007f9e8ccb31d0 R08: 0000000000000000 R09: 0000000000000000 [ 3590.772110][ T4736] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3590.780179][ T4736] R13: 00007ffe952cf46f R14: 00007f9e8ccb3300 R15: 0000000000022000 [ 3590.788233][ T4736] 14:44:44 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "13bd94e32c37a3932d8ad7271907f2903ccf3bb13b387d8fdf025cdf3c8faa37a970ea456fa2fd6f8354fc3b05088269a6d5b022e392b9bd78e5e2308e054c3e2cbb6e61b42c74f3c1ba8d63d10ed85dcc5d58071547cdfd9661f05024bcf8d7722e987a76fced66d3b33373d61da648b231fe3de6f7dc9a78420b7bf0a04efb660e06f2bf671a2060d09d80f7ee6ba3ae0b6edf87d14be34012ef95719e01f065ec7943a48dcce0fcf8f7f3a89c24d940f201c7c73a3c97872a80ca25d1a3114fe16f225f4f55f3c6456cab8f0aa59d8efdc6939eb7f2b223ceff25db5222ff8e86c024229beec9ce765151d6e706fd60ab8ffe4c2e736eec4bcae53c1aaaef"}}}, 0x20000260) (fail_nth: 36) 14:44:44 executing program 2: arch_prctl$ARCH_GET_GS(0x1004, &(0x7f0000000000)) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) 14:44:44 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x8}}}, 0x120) 14:44:44 executing program 4: r0 = io_uring_setup(0x1912, &(0x7f0000000000)={0x0, 0xb13, 0x20, 0x0, 0x323}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0xee00, 0xee00}}, './file0\x00'}) write$P9_RXATTRCREATE(r1, &(0x7f0000000140)={0x7, 0x21, 0x2}, 0x7) r2 = syz_genetlink_get_family_id$devlink(&(0x7f00000001c0), r1) sendmsg$DEVLINK_CMD_SB_OCC_SNAPSHOT(r1, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000200)={0xa8, r2, 0x400, 0x70bd25, 0x25dfdbfd, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0xb, 0xa3e00000}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x3ff}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x7}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0xfffff801}}]}, 0xa8}, 0x1, 0x0, 0x0, 0x840}, 0x4004) (async) r3 = inotify_init() inotify_rm_watch(r3, 0x0) (async) r4 = inotify_init() inotify_rm_watch(r4, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(r0, 0x6, &(0x7f00000000c0)={0x5a7a, 0x0, &(0x7f0000000080)=[r3, r4]}, 0x2) (async) io_setup(0x20, &(0x7f0000000340)) (async) openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) 14:44:44 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x4000, 0x0, "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"}}}, 0x20000260) 14:44:44 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) syz_io_uring_setup(0x1c6c, &(0x7f0000000000)={0x0, 0x9bd8, 0x2, 0x0, 0x2f6, 0x0, r0}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) r1 = socket$pptp(0x18, 0x1, 0x2) connect$pptp(r1, &(0x7f0000000100)={0x18, 0x2, {0x2, @local}}, 0x1e) 14:44:44 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) 14:44:44 executing program 2: arch_prctl$ARCH_GET_GS(0x1004, &(0x7f0000000000)) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) arch_prctl$ARCH_GET_GS(0x1004, &(0x7f0000000000)) (async) openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) (async) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) (async) 14:44:44 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x2}}}, 0x120) [ 3590.959842][ T4778] FAULT_INJECTION: forcing a failure. [ 3590.959842][ T4778] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3590.973156][ T4778] CPU: 1 PID: 4778 Comm: syz-executor.0 Not tainted 5.17.0-rc2-syzkaller-00167-gdcb85f85fa6f-dirty #0 [ 3590.984090][ T4778] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3590.994169][ T4778] Call Trace: [ 3590.997449][ T4778] [ 3591.000375][ T4778] dump_stack_lvl+0xd6/0x122 [ 3591.004984][ T4778] dump_stack+0x11/0x1b 14:44:44 executing program 5: fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000000)='/dev/bsg\x00', 0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000c40)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="2e2f5ebe607811b1922a37ab40e9ce89a725adf3015c2457870e1e607ccc9c20593b1811746051a6d12640640431d0c668d20a3c8d6b377f8d4facb617b63a0cdab7ca88f10acc02dc233771720fb206fcefbfab65f3ad74bc35fa9c1a0b761bde"]) fsconfig$FSCONFIG_SET_PATH_EMPTY(r0, 0x4, &(0x7f0000000a80)='!\x00', &(0x7f0000000ac0)='./file0\x00', 0xffffffffffffffff) r1 = syz_io_uring_setup(0x7902, &(0x7f0000000040)={0x0, 0x2b47, 0x15, 0x1, 0x37f}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f00000000c0), &(0x7f0000000100)) io_uring_register$IORING_UNREGISTER_EVENTFD(r1, 0x5, 0x0, 0x0) lstat(&(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)) fsconfig$FSCONFIG_SET_PATH(r0, 0x3, &(0x7f0000000bc0)='!\x00', &(0x7f0000000c00)='./file1\x00', 0xffffffffffffffff) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) io_setup(0x1, &(0x7f0000000140)=0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = inotify_init() inotify_rm_watch(r5, 0x0) r6 = fsmount(r2, 0x1, 0x82) r7 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000800), 0x2d03, 0x0) openat$bsg(0xffffffffffffff9c, &(0x7f0000000a00), 0x420000, 0x0) r8 = eventfd2(0x7ba, 0x80000) io_submit(r3, 0x9, &(0x7f0000000940)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x5, 0x1003, r4, &(0x7f0000000180)="a8bdf07f871ae9c9ea999f7df715af53888f01e845fd554c49fec9e43fe15fecbd2da80ffe9b74736189587dac86b950032fc621acac77e1fcccde60a85fd737dddf5a68d2f947c68d06df433c6199ca034b98e932968f43627245c8eaeec7d45e170e2ca06e96a6d13ecef463f17eed7cca", 0x72, 0x100}, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x8, 0x5, r1, &(0x7f0000000300)="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", 0xfb, 0xfffffffffffffffd, 0x0, 0x3, r2}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x7, r5, &(0x7f0000000400)="a3cda59dbc0c8eb21b203d8dddd6c3d1fb973d0fac8873c5c6c419543fe9f1ce1e5d23e17490de1fe211281a9b69bd4adc9403f6ebf10e269653bc2d2c8bafefe267e034396add96ae4cd78dfca7c5beed1f4cb0eb82bff7da0b8874d77ea4b80a5a95bedd987a6aadb0c823245e3400c1d4c0276782b320233c9a63129bc7ded4e2e4d924c4ed63da94aa884861d2b250ce140beea4c0962293e40ba5c7dc79a7470c8edfc3e002ce69a5216d8210f1c989bb", 0xb3, 0x4, 0x0, 0x0, r2}, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x1, 0x401, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x65d}, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, r2, &(0x7f0000000500)="9d1baec9309251f0710849d6c377951b0d7623f96cdcb61f85be7eef2b584600b82f87227916ba8853266ce04b137c36fc4931b36df55ba44f1fd76ec070e290ac5e82cc37fe751dcf24b9e794bb05f1899ba1909095ca0846a051d2ff55d69945102e845329381ccc6f3805efff9c97627598f2085af31cb3c4856ea5aecd5927be83597cf71868002ea47d43553bbd778ba86d433d66fa62340f9dd987604e58642d55b28f452f4c82c0b6afe4ed5a8b3711d0a0ca36587dcb572c35a76708c2a1fae14d873f431063c0b00092f13d684005a0d75de595", 0xd8, 0x7, 0x0, 0x1}, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x6, 0xda6, r1, &(0x7f0000000640)="210cc2dc128cc9fb6c7a4317d35748d1ea2421465ab4f4fdba783333c072e5004da74bb367893975e74be74d18fb333bc646bc57445fb41ffc6c510914d20d03af05336b50d8939c34858a36d0965051eb952156915f03d9caa5e4208cf358ec6c2498c1f337af7868531104c6d0c01d66ba0a6d55364cceb33cd62a93093a57df27a7a30835847c49b0374231a5633c64d78dd74599a90e2af41d5ee1d5c0a82e17fe8d62e5e82fc11521c361f32b0b2a94731e5410702491448f76", 0xbc, 0x0, 0x0, 0x2, r6}, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x3, 0x6ba8, r2, &(0x7f0000000740)="26a9ad6a1e0f4c7adfe96fc71901ce6844a2eff9a1097e35986a4198dfd4c605c17f7f78408131c13e26af5acca428ac1f616f98c5bbddcd30454d64019ae8133986c94a63d012a46b967d62d97fbec83ce489d91d1d120daaeb", 0x5a, 0x1, 0x0, 0x3, r2}, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x8, 0x4, r7, &(0x7f0000000840)="d9f45cfcff813dca30e5a7fa8266503df920442eb4b8e88597af67d48f777e3463b1408d8c1660232edbf1eb3bdf121e148b9106cb90309d1c22", 0x3a, 0x5, 0x0, 0x2, r8}, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x7, 0x20, r1, &(0x7f00000008c0)="a22fe0ed451641ec92712e0310acabb19a9cebcbbdd8ae52fca085c798b3bde7b94522091e24bbfc40778106ccba47972f4a92fcffbd152c", 0x38, 0x1, 0x0, 0x1, r2}]) mmap$IORING_OFF_SQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x10, r2, 0x0) fspick(0xffffffffffffffff, &(0x7f00000009c0)='./file0\x00', 0x0) [ 3591.009151][ T4778] should_fail+0x23c/0x250 [ 3591.013571][ T4778] __alloc_pages+0x102/0x330 [ 3591.018192][ T4778] alloc_pages_vma+0x67e/0x810 [ 3591.022960][ T4778] ? percpu_counter_add_batch+0x109/0x130 [ 3591.028736][ T4778] shmem_getpage_gfp+0x8b4/0x12c0 [ 3591.033763][ T4778] ? do_user_addr_fault+0x7d4/0xb90 [ 3591.039005][ T4778] shmem_write_begin+0x7e/0x100 [ 3591.043962][ T4778] generic_perform_write+0x1c8/0x400 [ 3591.049259][ T4778] ? shmem_write_begin+0x100/0x100 [ 3591.054376][ T4778] __generic_file_write_iter+0xf7/0x2b0 [ 3591.059924][ T4778] ? generic_write_checks+0x242/0x290 [ 3591.065355][ T4778] generic_file_write_iter+0x75/0x130 [ 3591.070731][ T4778] vfs_write+0x7f5/0x950 [ 3591.074989][ T4778] ksys_write+0xd9/0x190 [ 3591.079303][ T4778] __x64_sys_write+0x3e/0x50 [ 3591.083954][ T4778] do_syscall_64+0x44/0xd0 [ 3591.088373][ T4778] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3591.094277][ T4778] RIP: 0033:0x7f9e8db3d059 14:44:44 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x8008, 0x0, "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"}}}, 0x20000260) [ 3591.098717][ T4778] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 3591.118346][ T4778] RSP: 002b:00007f9e8ccb3168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3591.126764][ T4778] RAX: ffffffffffffffda RBX: 00007f9e8dc4ff60 RCX: 00007f9e8db3d059 [ 3591.134803][ T4778] RDX: 0000000020000260 RSI: 0000000020000140 RDI: 0000000000000003 [ 3591.142780][ T4778] RBP: 00007f9e8ccb31d0 R08: 0000000000000000 R09: 0000000000000000 [ 3591.150750][ T4778] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 14:44:44 executing program 2: arch_prctl$ARCH_GET_GS(0x1004, &(0x7f0000000000)) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "e0b3772264c43c79ea3709d20d36cc4637f10fb5de2d44e0a73f520c3612063189eaba7b99fa9556bcac2ba1fb34035db66efe1e7ea748d786f601d0dcc0875cb8313c7db8b6c64b414bd5a06373bc3fbdf80ab140bf4b8f6c4a991196664cd95bbff1abeb0e982cc9b17aac4b0381a35d7a53d098e99e432a3b2f69c8b9abd7356e7cc0700ff8a36c56bf3e8a01564cd35c263749dc7c61c59645ecda836dc9f9771ff0fcdeec9e4d22cc1722bacd35e0096e747dac83ef85aed84e433e8b13e27f70ad877ff1a53934e230ed382a6c4ff7a6c1d3bb2cee4b336dcd368e29a06ed88efe1806f129bfbdfccf6c5e3ba935eb8ad0af3928b311e0a1c89eca9c75"}}, 0x110) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) arch_prctl$ARCH_GET_GS(0x1004, &(0x7f0000000000)) (async) openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) (async) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "13bd94e32c37a3932d8ad7271907f2903ccf3bb13b387d8fdf025cdf3c8faa37a970ea456fa2fd6f8354fc3b05088269a6d5b022e392b9bd78e5e2308e054c3e2cbb6e61b42c74f3c1ba8d63d10ed85dcc5d58071547cdfd9661f05024bcf8d7722e987a76fced66d3b33373d61da648b231fe3de6f7dc9a78420b7bf0a04efb660e06f2bf671a2060d09d80f7ee6ba3ae0b6edf87d14be34012ef95719e01f065ec7943a48dcce0fcf8f7f3a89c24d940f201c7c73a3c97872a80ca25d1a3114fe16f225f4f55f3c6456cab8f0aa59d8efdc6939eb7f2b223ceff25db5222ff8e86c024229beec9ce765151d6e706fd60ab8ffe4c2e736eec4bcae53c1aaaef"}}}, 0x120) (async) 14:44:44 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x20000260) (fail_nth: 37) 14:44:44 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x3}}}, 0x120) [ 3591.158723][ T4778] R13: 00007ffe952cf46f R14: 00007f9e8ccb3300 R15: 0000000000022000 [ 3591.166721][ T4778] 14:44:44 executing program 2: write$RDMA_USER_CM_CMD_REJECT(0xffffffffffffffff, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) syslog(0x2, &(0x7f0000000340)=""/16, 0x10) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) 14:44:44 executing program 2: write$RDMA_USER_CM_CMD_REJECT(0xffffffffffffffff, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "e0b3772264c43c79ea3709d20d36cc4637f10fb5de2d44e0a73f520c3612063189eaba7b99fa9556bcac2ba1fb34035db66efe1e7ea748d786f601d0dcc0875cb8313c7db8b6c64b414bd5a06373bc3fbdf80ab140bf4b8f6c4a991196664cd95bbff1abeb0e982cc9b17aac4b0381a35d7a53d098e99e432a3b2f69c8b9abd7356e7cc0700ff8a36c56bf3e8a01564cd35c263749dc7c61c59645ecda836dc9f9771ff0fcdeec9e4d22cc1722bacd35e0096e747dac83ef85aed84e433e8b13e27f70ad877ff1a53934e230ed382a6c4ff7a6c1d3bb2cee4b336dcd368e29a06ed88efe1806f129bfbdfccf6c5e3ba935eb8ad0af3928b311e0a1c89eca9c75"}}, 0x110) syslog(0x2, &(0x7f0000000340)=""/16, 0x10) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) [ 3591.205675][ T4801] FAULT_INJECTION: forcing a failure. [ 3591.205675][ T4801] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3591.218755][ T4801] CPU: 1 PID: 4801 Comm: syz-executor.0 Not tainted 5.17.0-rc2-syzkaller-00167-gdcb85f85fa6f-dirty #0 [ 3591.229723][ T4801] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3591.239802][ T4801] Call Trace: [ 3591.243077][ T4801] [ 3591.246003][ T4801] dump_stack_lvl+0xd6/0x122 [ 3591.250679][ T4801] dump_stack+0x11/0x1b [ 3591.254929][ T4801] should_fail+0x23c/0x250 [ 3591.259351][ T4801] should_fail_usercopy+0x16/0x20 [ 3591.264386][ T4801] copy_page_from_iter_atomic+0x2f1/0xcd0 [ 3591.270198][ T4801] ? shmem_write_begin+0x7e/0x100 [ 3591.275226][ T4801] generic_perform_write+0x211/0x400 [ 3591.280533][ T4801] ? shmem_write_begin+0x100/0x100 [ 3591.285651][ T4801] __generic_file_write_iter+0xf7/0x2b0 [ 3591.291244][ T4801] ? generic_write_checks+0x242/0x290 [ 3591.296692][ T4801] generic_file_write_iter+0x75/0x130 [ 3591.302096][ T4801] vfs_write+0x7f5/0x950 [ 3591.306401][ T4801] ksys_write+0xd9/0x190 [ 3591.310645][ T4801] __x64_sys_write+0x3e/0x50 [ 3591.315261][ T4801] do_syscall_64+0x44/0xd0 [ 3591.319680][ T4801] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3591.325591][ T4801] RIP: 0033:0x7f9e8db3d059 [ 3591.330006][ T4801] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 14:44:44 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000080), 0x240542, 0x0) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r0, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x60, r1, 0x400, 0x70bd26, 0x25dfdbfd, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x2}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0xaaa9}}]}, 0x60}, 0x1, 0x0, 0x0, 0x40000}, 0x4080) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup_devices(r2, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 14:44:44 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x4}}}, 0x120) 14:44:44 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x100000, 0x0, "13bd94e32c37a3932d8ad7271907f2903ccf3bb13b387d8fdf025cdf3c8faa37a970ea456fa2fd6f8354fc3b05088269a6d5b022e392b9bd78e5e2308e054c3e2cbb6e61b42c74f3c1ba8d63d10ed85dcc5d58071547cdfd9661f05024bcf8d7722e987a76fced66d3b33373d61da648b231fe3de6f7dc9a78420b7bf0a04efb660e06f2bf671a2060d09d80f7ee6ba3ae0b6edf87d14be34012ef95719e01f065ec7943a48dcce0fcf8f7f3a89c24d940f201c7c73a3c97872a80ca25d1a3114fe16f225f4f55f3c6456cab8f0aa59d8efdc6939eb7f2b223ceff25db5222ff8e86c024229beec9ce765151d6e706fd60ab8ffe4c2e736eec4bcae53c1aaaef"}}}, 0x20000260) 14:44:44 executing program 2: write$RDMA_USER_CM_CMD_REJECT(0xffffffffffffffff, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) (async) syslog(0x2, &(0x7f0000000340)=""/16, 0x10) (async) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) 14:44:44 executing program 5: fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000000)='/dev/bsg\x00', 0x0, 0xffffffffffffffff) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000c40)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="2e2f5ebe607811b1922a37ab40e9ce89a725adf3015c2457870e1e607ccc9c20593b1811746051a6d12640640431d0c668d20a3c8d6b377f8d4facb617b63a0cdab7ca88f10acc02dc233771720fb206fcefbfab65f3ad74bc35fa9c1a0b761bde"]) fsconfig$FSCONFIG_SET_PATH_EMPTY(r0, 0x4, &(0x7f0000000a80)='!\x00', &(0x7f0000000ac0)='./file0\x00', 0xffffffffffffffff) (async) r1 = syz_io_uring_setup(0x7902, &(0x7f0000000040)={0x0, 0x2b47, 0x15, 0x1, 0x37f}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f00000000c0), &(0x7f0000000100)) io_uring_register$IORING_UNREGISTER_EVENTFD(r1, 0x5, 0x0, 0x0) (async) lstat(&(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)) (async) fsconfig$FSCONFIG_SET_PATH(r0, 0x3, &(0x7f0000000bc0)='!\x00', &(0x7f0000000c00)='./file1\x00', 0xffffffffffffffff) (async) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) (async) io_setup(0x1, &(0x7f0000000140)=0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) (async) r5 = inotify_init() inotify_rm_watch(r5, 0x0) r6 = fsmount(r2, 0x1, 0x82) r7 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000800), 0x2d03, 0x0) (async) openat$bsg(0xffffffffffffff9c, &(0x7f0000000a00), 0x420000, 0x0) (async) r8 = eventfd2(0x7ba, 0x80000) io_submit(r3, 0x9, &(0x7f0000000940)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x5, 0x1003, r4, &(0x7f0000000180)="a8bdf07f871ae9c9ea999f7df715af53888f01e845fd554c49fec9e43fe15fecbd2da80ffe9b74736189587dac86b950032fc621acac77e1fcccde60a85fd737dddf5a68d2f947c68d06df433c6199ca034b98e932968f43627245c8eaeec7d45e170e2ca06e96a6d13ecef463f17eed7cca", 0x72, 0x100}, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x8, 0x5, r1, &(0x7f0000000300)="86166e0c64c700aae02fdfae7dea1e15b5841e1eb8d1a23316910f77bac4139a9ac8b8a6a3599a9905247302b319b21f0fc05ae4e4111a18cca353ee296edca8f6cb7a0b56382e82e5cc3d2ba55a4009220ba30730226ecdc25b4f39bbfb17494e426b0d7b1a271f7c2d782865406fbaab2a6130494bd42bd33f7fe42b8b01829f1b1ee0aa875e1c9b2067611bab850d572835d18261b672c4e99d5ca9e4e6544f9eb9d16a0be8657ca0a15a1c9acfdd795d74e95c841f1231a532152399bbe93aac293dad81306da400dea97de9dfda508331166fbfab60bf3fb5c85ebddd24a4f36b946778751279dfe7dee38bfb86bb281c994420b8f45eac88", 0xfb, 0xfffffffffffffffd, 0x0, 0x3, r2}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x7, r5, &(0x7f0000000400)="a3cda59dbc0c8eb21b203d8dddd6c3d1fb973d0fac8873c5c6c419543fe9f1ce1e5d23e17490de1fe211281a9b69bd4adc9403f6ebf10e269653bc2d2c8bafefe267e034396add96ae4cd78dfca7c5beed1f4cb0eb82bff7da0b8874d77ea4b80a5a95bedd987a6aadb0c823245e3400c1d4c0276782b320233c9a63129bc7ded4e2e4d924c4ed63da94aa884861d2b250ce140beea4c0962293e40ba5c7dc79a7470c8edfc3e002ce69a5216d8210f1c989bb", 0xb3, 0x4, 0x0, 0x0, r2}, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x1, 0x401, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x65d}, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, r2, &(0x7f0000000500)="9d1baec9309251f0710849d6c377951b0d7623f96cdcb61f85be7eef2b584600b82f87227916ba8853266ce04b137c36fc4931b36df55ba44f1fd76ec070e290ac5e82cc37fe751dcf24b9e794bb05f1899ba1909095ca0846a051d2ff55d69945102e845329381ccc6f3805efff9c97627598f2085af31cb3c4856ea5aecd5927be83597cf71868002ea47d43553bbd778ba86d433d66fa62340f9dd987604e58642d55b28f452f4c82c0b6afe4ed5a8b3711d0a0ca36587dcb572c35a76708c2a1fae14d873f431063c0b00092f13d684005a0d75de595", 0xd8, 0x7, 0x0, 0x1}, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x6, 0xda6, r1, &(0x7f0000000640)="210cc2dc128cc9fb6c7a4317d35748d1ea2421465ab4f4fdba783333c072e5004da74bb367893975e74be74d18fb333bc646bc57445fb41ffc6c510914d20d03af05336b50d8939c34858a36d0965051eb952156915f03d9caa5e4208cf358ec6c2498c1f337af7868531104c6d0c01d66ba0a6d55364cceb33cd62a93093a57df27a7a30835847c49b0374231a5633c64d78dd74599a90e2af41d5ee1d5c0a82e17fe8d62e5e82fc11521c361f32b0b2a94731e5410702491448f76", 0xbc, 0x0, 0x0, 0x2, r6}, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x3, 0x6ba8, r2, &(0x7f0000000740)="26a9ad6a1e0f4c7adfe96fc71901ce6844a2eff9a1097e35986a4198dfd4c605c17f7f78408131c13e26af5acca428ac1f616f98c5bbddcd30454d64019ae8133986c94a63d012a46b967d62d97fbec83ce489d91d1d120daaeb", 0x5a, 0x1, 0x0, 0x3, r2}, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x8, 0x4, r7, &(0x7f0000000840)="d9f45cfcff813dca30e5a7fa8266503df920442eb4b8e88597af67d48f777e3463b1408d8c1660232edbf1eb3bdf121e148b9106cb90309d1c22", 0x3a, 0x5, 0x0, 0x2, r8}, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x7, 0x20, r1, &(0x7f00000008c0)="a22fe0ed451641ec92712e0310acabb19a9cebcbbdd8ae52fca085c798b3bde7b94522091e24bbfc40778106ccba47972f4a92fcffbd152c", 0x38, 0x1, 0x0, 0x1, r2}]) mmap$IORING_OFF_SQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x10, r2, 0x0) (async) fspick(0xffffffffffffffff, &(0x7f00000009c0)='./file0\x00', 0x0) [ 3591.349600][ T4801] RSP: 002b:00007f9e8ccb3168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3591.358108][ T4801] RAX: ffffffffffffffda RBX: 00007f9e8dc4ff60 RCX: 00007f9e8db3d059 [ 3591.366081][ T4801] RDX: 0000000020000260 RSI: 0000000020000140 RDI: 0000000000000003 [ 3591.374153][ T4801] RBP: 00007f9e8ccb31d0 R08: 0000000000000000 R09: 0000000000000000 [ 3591.382116][ T4801] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3591.390072][ T4801] R13: 00007ffe952cf46f R14: 00007f9e8ccb3300 R15: 0000000000022000 [ 3591.398185][ T4801] 14:44:44 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000080), 0x240542, 0x0) (async) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r0, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x60, r1, 0x400, 0x70bd26, 0x25dfdbfd, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x2}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0xaaa9}}]}, 0x60}, 0x1, 0x0, 0x0, 0x40000}, 0x4080) (async) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup_devices(r2, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 14:44:44 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x5}}}, 0x120) 14:44:44 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000080), 0x240542, 0x0) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r0, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x60, r1, 0x400, 0x70bd26, 0x25dfdbfd, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x2}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0xaaa9}}]}, 0x60}, 0x1, 0x0, 0x0, 0x40000}, 0x4080) (async) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup_devices(r2, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 14:44:44 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x20000260) (fail_nth: 38) 14:44:44 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x8}}}, 0x120) 14:44:44 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) write$P9_RFSYNC(r0, &(0x7f0000000040)={0x7, 0x33, 0x1}, 0x7) openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r1) r2 = inotify_init() inotify_rm_watch(r2, 0x0) r3 = inotify_init() inotify_rm_watch(r3, 0x0) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000080)=[r2, r3, 0xffffffffffffffff], 0x3) 14:44:44 executing program 5: fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000000)='/dev/bsg\x00', 0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000c40)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="2e2f5ebe607811b1922a37ab40e9ce89a725adf3015c2457870e1e607ccc9c20593b1811746051a6d12640640431d0c668d20a3c8d6b377f8d4facb617b63a0cdab7ca88f10acc02dc233771720fb206fcefbfab65f3ad74bc35fa9c1a0b761bde"]) fsconfig$FSCONFIG_SET_PATH_EMPTY(r0, 0x4, &(0x7f0000000a80)='!\x00', &(0x7f0000000ac0)='./file0\x00', 0xffffffffffffffff) r1 = syz_io_uring_setup(0x7902, &(0x7f0000000040)={0x0, 0x2b47, 0x15, 0x1, 0x37f}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f00000000c0), &(0x7f0000000100)) io_uring_register$IORING_UNREGISTER_EVENTFD(r1, 0x5, 0x0, 0x0) lstat(&(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)) fsconfig$FSCONFIG_SET_PATH(r0, 0x3, &(0x7f0000000bc0)='!\x00', &(0x7f0000000c00)='./file1\x00', 0xffffffffffffffff) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) io_setup(0x1, &(0x7f0000000140)=0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = inotify_init() inotify_rm_watch(r5, 0x0) r6 = fsmount(r2, 0x1, 0x82) r7 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000800), 0x2d03, 0x0) openat$bsg(0xffffffffffffff9c, &(0x7f0000000a00), 0x420000, 0x0) r8 = eventfd2(0x7ba, 0x80000) io_submit(r3, 0x9, &(0x7f0000000940)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x5, 0x1003, r4, &(0x7f0000000180)="a8bdf07f871ae9c9ea999f7df715af53888f01e845fd554c49fec9e43fe15fecbd2da80ffe9b74736189587dac86b950032fc621acac77e1fcccde60a85fd737dddf5a68d2f947c68d06df433c6199ca034b98e932968f43627245c8eaeec7d45e170e2ca06e96a6d13ecef463f17eed7cca", 0x72, 0x100}, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x8, 0x5, r1, &(0x7f0000000300)="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", 0xfb, 0xfffffffffffffffd, 0x0, 0x3, r2}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x7, r5, &(0x7f0000000400)="a3cda59dbc0c8eb21b203d8dddd6c3d1fb973d0fac8873c5c6c419543fe9f1ce1e5d23e17490de1fe211281a9b69bd4adc9403f6ebf10e269653bc2d2c8bafefe267e034396add96ae4cd78dfca7c5beed1f4cb0eb82bff7da0b8874d77ea4b80a5a95bedd987a6aadb0c823245e3400c1d4c0276782b320233c9a63129bc7ded4e2e4d924c4ed63da94aa884861d2b250ce140beea4c0962293e40ba5c7dc79a7470c8edfc3e002ce69a5216d8210f1c989bb", 0xb3, 0x4, 0x0, 0x0, r2}, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x1, 0x401, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x65d}, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, r2, &(0x7f0000000500)="9d1baec9309251f0710849d6c377951b0d7623f96cdcb61f85be7eef2b584600b82f87227916ba8853266ce04b137c36fc4931b36df55ba44f1fd76ec070e290ac5e82cc37fe751dcf24b9e794bb05f1899ba1909095ca0846a051d2ff55d69945102e845329381ccc6f3805efff9c97627598f2085af31cb3c4856ea5aecd5927be83597cf71868002ea47d43553bbd778ba86d433d66fa62340f9dd987604e58642d55b28f452f4c82c0b6afe4ed5a8b3711d0a0ca36587dcb572c35a76708c2a1fae14d873f431063c0b00092f13d684005a0d75de595", 0xd8, 0x7, 0x0, 0x1}, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x6, 0xda6, r1, &(0x7f0000000640)="210cc2dc128cc9fb6c7a4317d35748d1ea2421465ab4f4fdba783333c072e5004da74bb367893975e74be74d18fb333bc646bc57445fb41ffc6c510914d20d03af05336b50d8939c34858a36d0965051eb952156915f03d9caa5e4208cf358ec6c2498c1f337af7868531104c6d0c01d66ba0a6d55364cceb33cd62a93093a57df27a7a30835847c49b0374231a5633c64d78dd74599a90e2af41d5ee1d5c0a82e17fe8d62e5e82fc11521c361f32b0b2a94731e5410702491448f76", 0xbc, 0x0, 0x0, 0x2, r6}, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x3, 0x6ba8, r2, &(0x7f0000000740)="26a9ad6a1e0f4c7adfe96fc71901ce6844a2eff9a1097e35986a4198dfd4c605c17f7f78408131c13e26af5acca428ac1f616f98c5bbddcd30454d64019ae8133986c94a63d012a46b967d62d97fbec83ce489d91d1d120daaeb", 0x5a, 0x1, 0x0, 0x3, r2}, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x8, 0x4, r7, &(0x7f0000000840)="d9f45cfcff813dca30e5a7fa8266503df920442eb4b8e88597af67d48f777e3463b1408d8c1660232edbf1eb3bdf121e148b9106cb90309d1c22", 0x3a, 0x5, 0x0, 0x2, r8}, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x7, 0x20, r1, &(0x7f00000008c0)="a22fe0ed451641ec92712e0310acabb19a9cebcbbdd8ae52fca085c798b3bde7b94522091e24bbfc40778106ccba47972f4a92fcffbd152c", 0x38, 0x1, 0x0, 0x1, r2}]) mmap$IORING_OFF_SQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x10, r2, 0x0) fspick(0xffffffffffffffff, &(0x7f00000009c0)='./file0\x00', 0x0) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000000)='/dev/bsg\x00', 0x0, 0xffffffffffffffff) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000c40)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="2e2f5ebe607811b1922a37ab40e9ce89a725adf3015c2457870e1e607ccc9c20593b1811746051a6d12640640431d0c668d20a3c8d6b377f8d4facb617b63a0cdab7ca88f10acc02dc233771720fb206fcefbfab65f3ad74bc35fa9c1a0b761bde"]) (async) fsconfig$FSCONFIG_SET_PATH_EMPTY(r0, 0x4, &(0x7f0000000a80)='!\x00', &(0x7f0000000ac0)='./file0\x00', 0xffffffffffffffff) (async) syz_io_uring_setup(0x7902, &(0x7f0000000040)={0x0, 0x2b47, 0x15, 0x1, 0x37f}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f00000000c0), &(0x7f0000000100)) (async) io_uring_register$IORING_UNREGISTER_EVENTFD(r1, 0x5, 0x0, 0x0) (async) lstat(&(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)) (async) fsconfig$FSCONFIG_SET_PATH(r0, 0x3, &(0x7f0000000bc0)='!\x00', &(0x7f0000000c00)='./file1\x00', 0xffffffffffffffff) (async) openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) (async) io_setup(0x1, &(0x7f0000000140)) (async) socket$inet_udp(0x2, 0x2, 0x0) (async) inotify_init() (async) inotify_rm_watch(r5, 0x0) (async) fsmount(r2, 0x1, 0x82) (async) openat$autofs(0xffffffffffffff9c, &(0x7f0000000800), 0x2d03, 0x0) (async) openat$bsg(0xffffffffffffff9c, &(0x7f0000000a00), 0x420000, 0x0) (async) eventfd2(0x7ba, 0x80000) (async) io_submit(r3, 0x9, &(0x7f0000000940)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x5, 0x1003, r4, &(0x7f0000000180)="a8bdf07f871ae9c9ea999f7df715af53888f01e845fd554c49fec9e43fe15fecbd2da80ffe9b74736189587dac86b950032fc621acac77e1fcccde60a85fd737dddf5a68d2f947c68d06df433c6199ca034b98e932968f43627245c8eaeec7d45e170e2ca06e96a6d13ecef463f17eed7cca", 0x72, 0x100}, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x8, 0x5, r1, &(0x7f0000000300)="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", 0xfb, 0xfffffffffffffffd, 0x0, 0x3, r2}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x7, r5, &(0x7f0000000400)="a3cda59dbc0c8eb21b203d8dddd6c3d1fb973d0fac8873c5c6c419543fe9f1ce1e5d23e17490de1fe211281a9b69bd4adc9403f6ebf10e269653bc2d2c8bafefe267e034396add96ae4cd78dfca7c5beed1f4cb0eb82bff7da0b8874d77ea4b80a5a95bedd987a6aadb0c823245e3400c1d4c0276782b320233c9a63129bc7ded4e2e4d924c4ed63da94aa884861d2b250ce140beea4c0962293e40ba5c7dc79a7470c8edfc3e002ce69a5216d8210f1c989bb", 0xb3, 0x4, 0x0, 0x0, r2}, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x1, 0x401, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x65d}, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, r2, &(0x7f0000000500)="9d1baec9309251f0710849d6c377951b0d7623f96cdcb61f85be7eef2b584600b82f87227916ba8853266ce04b137c36fc4931b36df55ba44f1fd76ec070e290ac5e82cc37fe751dcf24b9e794bb05f1899ba1909095ca0846a051d2ff55d69945102e845329381ccc6f3805efff9c97627598f2085af31cb3c4856ea5aecd5927be83597cf71868002ea47d43553bbd778ba86d433d66fa62340f9dd987604e58642d55b28f452f4c82c0b6afe4ed5a8b3711d0a0ca36587dcb572c35a76708c2a1fae14d873f431063c0b00092f13d684005a0d75de595", 0xd8, 0x7, 0x0, 0x1}, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x6, 0xda6, r1, &(0x7f0000000640)="210cc2dc128cc9fb6c7a4317d35748d1ea2421465ab4f4fdba783333c072e5004da74bb367893975e74be74d18fb333bc646bc57445fb41ffc6c510914d20d03af05336b50d8939c34858a36d0965051eb952156915f03d9caa5e4208cf358ec6c2498c1f337af7868531104c6d0c01d66ba0a6d55364cceb33cd62a93093a57df27a7a30835847c49b0374231a5633c64d78dd74599a90e2af41d5ee1d5c0a82e17fe8d62e5e82fc11521c361f32b0b2a94731e5410702491448f76", 0xbc, 0x0, 0x0, 0x2, r6}, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x3, 0x6ba8, r2, &(0x7f0000000740)="26a9ad6a1e0f4c7adfe96fc71901ce6844a2eff9a1097e35986a4198dfd4c605c17f7f78408131c13e26af5acca428ac1f616f98c5bbddcd30454d64019ae8133986c94a63d012a46b967d62d97fbec83ce489d91d1d120daaeb", 0x5a, 0x1, 0x0, 0x3, r2}, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x8, 0x4, r7, &(0x7f0000000840)="d9f45cfcff813dca30e5a7fa8266503df920442eb4b8e88597af67d48f777e3463b1408d8c1660232edbf1eb3bdf121e148b9106cb90309d1c22", 0x3a, 0x5, 0x0, 0x2, r8}, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x7, 0x20, r1, &(0x7f00000008c0)="a22fe0ed451641ec92712e0310acabb19a9cebcbbdd8ae52fca085c798b3bde7b94522091e24bbfc40778106ccba47972f4a92fcffbd152c", 0x38, 0x1, 0x0, 0x1, r2}]) (async) mmap$IORING_OFF_SQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x10, r2, 0x0) (async) fspick(0xffffffffffffffff, &(0x7f00000009c0)='./file0\x00', 0x0) (async) 14:44:44 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) 14:44:44 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) write$P9_RFSYNC(r0, &(0x7f0000000040)={0x7, 0x33, 0x1}, 0x7) openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r1) r2 = inotify_init() inotify_rm_watch(r2, 0x0) r3 = inotify_init() inotify_rm_watch(r3, 0x0) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000080)=[r2, r3, 0xffffffffffffffff], 0x3) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) (async) write$P9_RFSYNC(r0, &(0x7f0000000040)={0x7, 0x33, 0x1}, 0x7) (async) openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) (async) openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) (async) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r1) (async) inotify_init() (async) inotify_rm_watch(r2, 0x0) (async) inotify_init() (async) inotify_rm_watch(r3, 0x0) (async) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000080)=[r2, r3, 0xffffffffffffffff], 0x3) (async) [ 3591.586474][ T4838] FAULT_INJECTION: forcing a failure. [ 3591.586474][ T4838] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3591.599810][ T4838] CPU: 0 PID: 4838 Comm: syz-executor.0 Not tainted 5.17.0-rc2-syzkaller-00167-gdcb85f85fa6f-dirty #0 [ 3591.610782][ T4838] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3591.620908][ T4838] Call Trace: [ 3591.624184][ T4838] [ 3591.627117][ T4838] dump_stack_lvl+0xd6/0x122 [ 3591.631717][ T4838] dump_stack+0x11/0x1b 14:44:44 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x1000000, 0x0, "13bd94e32c37a3932d8ad7271907f2903ccf3bb13b387d8fdf025cdf3c8faa37a970ea456fa2fd6f8354fc3b05088269a6d5b022e392b9bd78e5e2308e054c3e2cbb6e61b42c74f3c1ba8d63d10ed85dcc5d58071547cdfd9661f05024bcf8d7722e987a76fced66d3b33373d61da648b231fe3de6f7dc9a78420b7bf0a04efb660e06f2bf671a2060d09d80f7ee6ba3ae0b6edf87d14be34012ef95719e01f065ec7943a48dcce0fcf8f7f3a89c24d940f201c7c73a3c97872a80ca25d1a3114fe16f225f4f55f3c6456cab8f0aa59d8efdc6939eb7f2b223ceff25db5222ff8e86c024229beec9ce765151d6e706fd60ab8ffe4c2e736eec4bcae53c1aaaef"}}}, 0x20000260) [ 3591.635945][ T4838] should_fail+0x23c/0x250 [ 3591.640426][ T4838] __alloc_pages+0x102/0x330 [ 3591.645029][ T4838] alloc_pages_vma+0x67e/0x810 [ 3591.649877][ T4838] ? percpu_counter_add_batch+0x109/0x130 [ 3591.655621][ T4838] shmem_getpage_gfp+0x8b4/0x12c0 [ 3591.660658][ T4838] ? do_user_addr_fault+0x7d4/0xb90 [ 3591.665959][ T4838] shmem_write_begin+0x7e/0x100 [ 3591.670820][ T4838] generic_perform_write+0x1c8/0x400 [ 3591.676144][ T4838] ? shmem_write_begin+0x100/0x100 [ 3591.681263][ T4838] __generic_file_write_iter+0xf7/0x2b0 [ 3591.686848][ T4838] ? generic_write_checks+0x242/0x290 [ 3591.692228][ T4838] generic_file_write_iter+0x75/0x130 [ 3591.697687][ T4838] vfs_write+0x7f5/0x950 [ 3591.701936][ T4838] ksys_write+0xd9/0x190 [ 3591.706239][ T4838] __x64_sys_write+0x3e/0x50 [ 3591.710828][ T4838] do_syscall_64+0x44/0xd0 [ 3591.715251][ T4838] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3591.721196][ T4838] RIP: 0033:0x7f9e8db3d059 [ 3591.725607][ T4838] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 3591.745244][ T4838] RSP: 002b:00007f9e8ccb3168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3591.753659][ T4838] RAX: ffffffffffffffda RBX: 00007f9e8dc4ff60 RCX: 00007f9e8db3d059 [ 3591.761696][ T4838] RDX: 0000000020000260 RSI: 0000000020000140 RDI: 0000000000000003 [ 3591.769670][ T4838] RBP: 00007f9e8ccb31d0 R08: 0000000000000000 R09: 0000000000000000 [ 3591.777638][ T4838] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 14:44:44 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000)={0xffffffffffffffff}, 0x111, 0xa}}, 0x20) r2 = socket(0x2c, 0x3, 0xfffffff8) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000080)=[r2], 0x1) write$RDMA_USER_CM_CMD_REJECT(0xffffffffffffffff, &(0x7f0000000500)={0x9, 0x108, 0xfa00, {r1, 0x1, "b53042", "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"}}, 0x110) 14:44:44 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) write$P9_RFSYNC(r0, &(0x7f0000000040)={0x7, 0x33, 0x1}, 0x7) (async) openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) (async) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r1) (async) r2 = inotify_init() inotify_rm_watch(r2, 0x0) r3 = inotify_init() inotify_rm_watch(r3, 0x0) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000080)=[r2, r3, 0xffffffffffffffff], 0x3) 14:44:44 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x2}}}, 0x120) 14:44:44 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x2000000, 0x0, "13bd94e32c37a3932d8ad7271907f2903ccf3bb13b387d8fdf025cdf3c8faa37a970ea456fa2fd6f8354fc3b05088269a6d5b022e392b9bd78e5e2308e054c3e2cbb6e61b42c74f3c1ba8d63d10ed85dcc5d58071547cdfd9661f05024bcf8d7722e987a76fced66d3b33373d61da648b231fe3de6f7dc9a78420b7bf0a04efb660e06f2bf671a2060d09d80f7ee6ba3ae0b6edf87d14be34012ef95719e01f065ec7943a48dcce0fcf8f7f3a89c24d940f201c7c73a3c97872a80ca25d1a3114fe16f225f4f55f3c6456cab8f0aa59d8efdc6939eb7f2b223ceff25db5222ff8e86c024229beec9ce765151d6e706fd60ab8ffe4c2e736eec4bcae53c1aaaef"}}}, 0x20000260) 14:44:44 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x20000260) (fail_nth: 39) [ 3591.785621][ T4838] R13: 00007ffe952cf46f R14: 00007f9e8ccb3300 R15: 0000000000022000 [ 3591.793606][ T4838] [ 3591.826651][ T4882] FAULT_INJECTION: forcing a failure. [ 3591.826651][ T4882] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3591.839843][ T4882] CPU: 1 PID: 4882 Comm: syz-executor.0 Not tainted 5.17.0-rc2-syzkaller-00167-gdcb85f85fa6f-dirty #0 [ 3591.850831][ T4882] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3591.860914][ T4882] Call Trace: [ 3591.864192][ T4882] [ 3591.867121][ T4882] dump_stack_lvl+0xd6/0x122 [ 3591.871727][ T4882] dump_stack+0x11/0x1b [ 3591.875889][ T4882] should_fail+0x23c/0x250 [ 3591.880307][ T4882] should_fail_usercopy+0x16/0x20 14:44:45 executing program 4: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_drop_inode\x00'}, 0xfffffffffffffe13) openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) 14:44:45 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x3}}}, 0x120) 14:44:45 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "e0b3772264c43c79ea3709d20d36cc4637f10fb5de2d44e0a73f520c3612063189eaba7b99fa9556bcac2ba1fb34035db66efe1e7ea748d786f601d0dcc0875cb8313c7db8b6c64b414bd5a06373bc3fbdf80ab140bf4b8f6c4a991196664cd95bbff1abeb0e982cc9b17aac4b0381a35d7a53d098e99e432a3b2f69c8b9abd7356e7cc0700ff8a36c56bf3e8a01564cd35c263749dc7c61c59645ecda836dc9f9771ff0fcdeec9e4d22cc1722bacd35e0096e747dac83ef85aed84e433e8b13e27f70ad877ff1a53934e230ed382a6c4ff7a6c1d3bb2cee4b336dcd368e29a06ed88efe1806f129bfbdfccf6c5e3ba935eb8ad0af3928b311e0a1c89eca9c75"}}, 0x110) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "13bd94e32c37a3932d8ad7271907f2903ccf3bb13b387d8fdf025cdf3c8faa37a970ea456fa2fd6f8354fc3b05088269a6d5b022e392b9bd78e5e2308e054c3e2cbb6e61b42c74f3c1ba8d63d10ed85dcc5d58071547cdfd9661f05024bcf8d7722e987a76fced66d3b33373d61da648b231fe3de6f7dc9a78420b7bf0a04efb660e06f2bf671a2060d09d80f7ee6ba3ae0b6edf87d14be34012ef95719e01f065ec7943a48dcce0fcf8f7f3a89c24d940f201c7c73a3c97872a80ca25d1a3114fe16f225f4f55f3c6456cab8f0aa59d8efdc6939eb7f2b223ceff25db5222ff8e86c024229beec9ce765151d6e706fd60ab8ffe4c2e736eec4bcae53c1aaaef"}}}, 0x120) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000)={0xffffffffffffffff}, 0x111, 0xa}}, 0x20) r2 = socket(0x2c, 0x3, 0xfffffff8) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000080)=[r2], 0x1) (async) write$RDMA_USER_CM_CMD_REJECT(0xffffffffffffffff, &(0x7f0000000500)={0x9, 0x108, 0xfa00, {r1, 0x1, "b53042", "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"}}, 0x110) [ 3591.885330][ T4882] copy_page_from_iter_atomic+0x2f1/0xcd0 [ 3591.891109][ T4882] ? shmem_write_begin+0x7e/0x100 [ 3591.896207][ T4882] generic_perform_write+0x211/0x400 [ 3591.901496][ T4882] ? shmem_write_begin+0x100/0x100 [ 3591.906624][ T4882] __generic_file_write_iter+0xf7/0x2b0 [ 3591.912171][ T4882] ? generic_write_checks+0x242/0x290 [ 3591.917550][ T4882] generic_file_write_iter+0x75/0x130 [ 3591.923000][ T4882] vfs_write+0x7f5/0x950 [ 3591.927248][ T4882] ksys_write+0xd9/0x190 [ 3591.931498][ T4882] __x64_sys_write+0x3e/0x50 [ 3591.936090][ T4882] do_syscall_64+0x44/0xd0 [ 3591.940512][ T4882] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3591.946507][ T4882] RIP: 0033:0x7f9e8db3d059 [ 3591.950996][ T4882] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 3591.971605][ T4882] RSP: 002b:00007f9e8ccb3168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3591.980026][ T4882] RAX: ffffffffffffffda RBX: 00007f9e8dc4ff60 RCX: 00007f9e8db3d059 14:44:45 executing program 5: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r1) connect$pptp(r1, &(0x7f0000000000)={0x18, 0x2, {0x3, @dev={0xac, 0x14, 0x14, 0x10}}}, 0x1e) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(r0, 0x40046210, &(0x7f0000000080)) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x10, r2, 0x0) 14:44:45 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x2040000, 0x0, "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"}}}, 0x20000260) 14:44:45 executing program 4: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_drop_inode\x00'}, 0xfffffffffffffe13) openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) 14:44:45 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x4}}}, 0x120) 14:44:45 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000)={0xffffffffffffffff}, 0x111, 0xa}}, 0x20) (async) r2 = socket(0x2c, 0x3, 0xfffffff8) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000080)=[r2], 0x1) write$RDMA_USER_CM_CMD_REJECT(0xffffffffffffffff, &(0x7f0000000500)={0x9, 0x108, 0xfa00, {r1, 0x1, "b53042", "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"}}, 0x110) [ 3591.988005][ T4882] RDX: 0000000020000260 RSI: 0000000020000140 RDI: 0000000000000003 [ 3591.996062][ T4882] RBP: 00007f9e8ccb31d0 R08: 0000000000000000 R09: 0000000000000000 [ 3592.004055][ T4882] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3592.012034][ T4882] R13: 00007ffe952cf46f R14: 00007f9e8ccb3300 R15: 0000000000022000 [ 3592.020008][ T4882] 14:44:45 executing program 4: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_drop_inode\x00'}, 0xfffffffffffffe13) openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_drop_inode\x00'}, 0xfffffffffffffe13) (async) openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) (async) 14:44:45 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x5}}}, 0x120) 14:44:45 executing program 4: keyctl$KEYCTL_CAPABILITIES(0x1f, &(0x7f0000000000)=""/4096, 0x1000) openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) 14:44:45 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x20000260) (fail_nth: 40) 14:44:45 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) inotify_rm_watch(r0, 0x0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}}}, 0x120) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="8100000000000000df250600000005000100000000001400060a76a3c2683056766972745f7769666900"], 0x30}, 0x1, 0x0, 0x0, 0x20008000}, 0x94) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), 0xffffffffffffffff) r2 = inotify_init() inotify_rm_watch(r2, 0x0) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000300)=[r0, r2, 0xffffffffffffffff], 0x3) io_uring_enter(0xffffffffffffffff, 0x2f3, 0x5061, 0x0, &(0x7f0000000340)={[0x8]}, 0x8) 14:44:45 executing program 5: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r1) connect$pptp(r1, &(0x7f0000000000)={0x18, 0x2, {0x3, @dev={0xac, 0x14, 0x14, 0x10}}}, 0x1e) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(r0, 0x40046210, &(0x7f0000000080)) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x10, r2, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000040)={{0x1, 0x1, 0x18}, './file0\x00'}) (async) io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) (async) openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) (async) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r1) (async) connect$pptp(r1, &(0x7f0000000000)={0x18, 0x2, {0x3, @dev={0xac, 0x14, 0x14, 0x10}}}, 0x1e) (async) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(r0, 0x40046210, &(0x7f0000000080)) (async) openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) (async) mmap$IORING_OFF_SQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x10, r2, 0x0) (async) 14:44:45 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x8}}}, 0x120) 14:44:45 executing program 4: keyctl$KEYCTL_CAPABILITIES(0x1f, &(0x7f0000000000)=""/4096, 0x1000) openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) keyctl$KEYCTL_CAPABILITIES(0x1f, &(0x7f0000000000)=""/4096, 0x1000) (async) openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) (async) [ 3592.206383][ T4926] FAULT_INJECTION: forcing a failure. [ 3592.206383][ T4926] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3592.219695][ T4926] CPU: 0 PID: 4926 Comm: syz-executor.0 Not tainted 5.17.0-rc2-syzkaller-00167-gdcb85f85fa6f-dirty #0 [ 3592.230652][ T4926] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3592.240732][ T4926] Call Trace: [ 3592.244005][ T4926] [ 3592.246933][ T4926] dump_stack_lvl+0xd6/0x122 [ 3592.251530][ T4926] dump_stack+0x11/0x1b 14:44:45 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x3000000, 0x0, "13bd94e32c37a3932d8ad7271907f2903ccf3bb13b387d8fdf025cdf3c8faa37a970ea456fa2fd6f8354fc3b05088269a6d5b022e392b9bd78e5e2308e054c3e2cbb6e61b42c74f3c1ba8d63d10ed85dcc5d58071547cdfd9661f05024bcf8d7722e987a76fced66d3b33373d61da648b231fe3de6f7dc9a78420b7bf0a04efb660e06f2bf671a2060d09d80f7ee6ba3ae0b6edf87d14be34012ef95719e01f065ec7943a48dcce0fcf8f7f3a89c24d940f201c7c73a3c97872a80ca25d1a3114fe16f225f4f55f3c6456cab8f0aa59d8efdc6939eb7f2b223ceff25db5222ff8e86c024229beec9ce765151d6e706fd60ab8ffe4c2e736eec4bcae53c1aaaef"}}}, 0x20000260) 14:44:45 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) 14:44:45 executing program 4: keyctl$KEYCTL_CAPABILITIES(0x1f, &(0x7f0000000000)=""/4096, 0x1000) openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) 14:44:45 executing program 5: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) (async) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r1) (async) connect$pptp(r1, &(0x7f0000000000)={0x18, 0x2, {0x3, @dev={0xac, 0x14, 0x14, 0x10}}}, 0x1e) (async, rerun: 32) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(r0, 0x40046210, &(0x7f0000000080)) (async, rerun: 32) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x10, r2, 0x0) 14:44:45 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) inotify_rm_watch(r0, 0x0) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) (async, rerun: 32) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}}}, 0x120) (async, rerun: 32) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="8100000000000000df250600000005000100000000001400060a76a3c2683056766972745f7769666900"], 0x30}, 0x1, 0x0, 0x0, 0x20008000}, 0x94) (async) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), 0xffffffffffffffff) r2 = inotify_init() inotify_rm_watch(r2, 0x0) (async, rerun: 64) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000300)=[r0, r2, 0xffffffffffffffff], 0x3) (async, rerun: 64) io_uring_enter(0xffffffffffffffff, 0x2f3, 0x5061, 0x0, &(0x7f0000000340)={[0x8]}, 0x8) 14:44:45 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) inotify_rm_watch(r0, 0x0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) (async) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "13bd94e32c37a3932d8ad7271907f2903ccf3bb13b387d8fdf025cdf3c8faa37a970ea456fa2fd6f8354fc3b05088269a6d5b022e392b9bd78e5e2308e054c3e2cbb6e61b42c74f3c1ba8d63d10ed85dcc5d58071547cdfd9661f05024bcf8d7722e987a76fced66d3b33373d61da648b231fe3de6f7dc9a78420b7bf0a04efb660e06f2bf671a2060d09d80f7ee6ba3ae0b6edf87d14be34012ef95719e01f065ec7943a48dcce0fcf8f7f3a89c24d940f201c7c73a3c97872a80ca25d1a3114fe16f225f4f55f3c6456cab8f0aa59d8efdc6939eb7f2b223ceff25db5222ff8e86c024229beec9ce765151d6e706fd60ab8ffe4c2e736eec4bcae53c1aaaef", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}}}, 0x120) (async, rerun: 32) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (rerun: 32) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="8100000000000000df250600000005000100000000001400060a76a3c2683056766972745f7769666900"], 0x30}, 0x1, 0x0, 0x0, 0x20008000}, 0x94) (async, rerun: 32) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), 0xffffffffffffffff) (async, rerun: 32) r2 = inotify_init() inotify_rm_watch(r2, 0x0) (async) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000300)=[r0, r2, 0xffffffffffffffff], 0x3) io_uring_enter(0xffffffffffffffff, 0x2f3, 0x5061, 0x0, &(0x7f0000000340)={[0x8]}, 0x8) [ 3592.255691][ T4926] should_fail+0x23c/0x250 [ 3592.260115][ T4926] __alloc_pages+0x102/0x330 [ 3592.264709][ T4926] alloc_pages_vma+0x67e/0x810 [ 3592.269544][ T4926] ? percpu_counter_add_batch+0x109/0x130 [ 3592.275292][ T4926] shmem_getpage_gfp+0x8b4/0x12c0 [ 3592.280427][ T4926] ? do_user_addr_fault+0x7d4/0xb90 [ 3592.285648][ T4926] shmem_write_begin+0x7e/0x100 [ 3592.290529][ T4926] generic_perform_write+0x1c8/0x400 [ 3592.295917][ T4926] ? shmem_write_begin+0x100/0x100 [ 3592.301050][ T4926] __generic_file_write_iter+0xf7/0x2b0 14:44:45 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r1) r2 = syz_io_uring_setup(0x4e3c, &(0x7f0000000000)={0x0, 0x7fc3, 0x20, 0x3, 0x20c, 0x0, r0}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) r3 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/attr/sockcreate\x00', 0x2, 0x0) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000280)=[r2, r0, r0, r0, r3], 0x5) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) 14:44:45 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000400)={0xffffffffffffffff}, 0x2, 0x5}}, 0x20) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f00000001c0), 0x80a02, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000580), 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r2, &(0x7f00000005c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000540), 0xffffffffffffffff, r3}}, 0x18) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f0000000480)={0x5, 0x10, 0xfa00, {&(0x7f0000000200), r1, 0x1}}, 0x18) fsconfig$FSCONFIG_SET_BINARY(0xffffffffffffffff, 0x2, &(0x7f0000000000)='-\x00', &(0x7f0000000040)="8dc1d82df3750ddd7d8a3476f12555cc4c93b34267d99968441eff4c33f9e1bddc2d0b641e0c4e955b6823a06949a0462b06ab38084f0980d0c223eb199e0a3ac6fb03a361420a2d36ed94ef7338157e4883bfc680d10fc44d66f11336c796b8209cf3386757a4bdd26571ab4597463a774aeb6130e72b9a161437a044f968bfec31daa2ab6e6d3b2eedac8a264ac6a02afbac5991d977da125041cf689191e7649424d436b82fa795d48b2a69c49619b77512ff1d5cb698", 0xb8) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x13d, 0x9}}, 0x20) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000180), 0x488000, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f00000004c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x7ff, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0xffb}, {0xa, 0x4e23, 0x80000000, @empty, 0x8000}, r4, 0xfff}}, 0x48) [ 3592.306603][ T4926] ? generic_write_checks+0x242/0x290 [ 3592.312006][ T4926] generic_file_write_iter+0x75/0x130 [ 3592.317383][ T4926] vfs_write+0x7f5/0x950 [ 3592.321730][ T4926] ksys_write+0xd9/0x190 [ 3592.326090][ T4926] __x64_sys_write+0x3e/0x50 [ 3592.330686][ T4926] do_syscall_64+0x44/0xd0 [ 3592.335115][ T4926] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3592.341020][ T4926] RIP: 0033:0x7f9e8db3d059 [ 3592.345432][ T4926] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 3592.365089][ T4926] RSP: 002b:00007f9e8ccb3168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3592.373785][ T4926] RAX: ffffffffffffffda RBX: 00007f9e8dc4ff60 RCX: 00007f9e8db3d059 [ 3592.381864][ T4926] RDX: 0000000020000260 RSI: 0000000020000140 RDI: 0000000000000003 [ 3592.389819][ T4926] RBP: 00007f9e8ccb31d0 R08: 0000000000000000 R09: 0000000000000000 [ 3592.397773][ T4926] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 14:44:45 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "13bd94e32c37a3932d8ad7271907f2903ccf3bb13b387d8fdf025cdf3c8faa37a970ea456fa2fd6f8354fc3b05088269a6d5b022e392b9bd78e5e2308e054c3e2cbb6e61b42c74f3c1ba8d63d10ed85dcc5d58071547cdfd9661f05024bcf8d7722e987a76fced66d3b33373d61da648b231fe3de6f7dc9a78420b7bf0a04efb660e06f2bf671a2060d09d80f7ee6ba3ae0b6edf87d14be34012ef95719e01f065ec7943a48dcce0fcf8f7f3a89c24d940f201c7c73a3c97872a80ca25d1a3114fe16f225f4f55f3c6456cab8f0aa59d8efdc6939eb7f2b223ceff25db5222ff8e86c024229beec9ce765151d6e706fd60ab8ffe4c2e736eec4bcae53c1aaaef"}}}, 0x20000260) (fail_nth: 41) 14:44:45 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000400)={0xffffffffffffffff}, 0x2, 0x5}}, 0x20) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f00000001c0), 0x80a02, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000580), 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r2, &(0x7f00000005c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000540), 0xffffffffffffffff, r3}}, 0x18) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f0000000480)={0x5, 0x10, 0xfa00, {&(0x7f0000000200), r1, 0x1}}, 0x18) fsconfig$FSCONFIG_SET_BINARY(0xffffffffffffffff, 0x2, &(0x7f0000000000)='-\x00', &(0x7f0000000040)="8dc1d82df3750ddd7d8a3476f12555cc4c93b34267d99968441eff4c33f9e1bddc2d0b641e0c4e955b6823a06949a0462b06ab38084f0980d0c223eb199e0a3ac6fb03a361420a2d36ed94ef7338157e4883bfc680d10fc44d66f11336c796b8209cf3386757a4bdd26571ab4597463a774aeb6130e72b9a161437a044f968bfec31daa2ab6e6d3b2eedac8a264ac6a02afbac5991d977da125041cf689191e7649424d436b82fa795d48b2a69c49619b77512ff1d5cb698", 0xb8) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x13d, 0x9}}, 0x20) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000180), 0x488000, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f00000004c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x7ff, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0xffb}, {0xa, 0x4e23, 0x80000000, @empty, 0x8000}, r4, 0xfff}}, 0x48) openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000400), 0x2, 0x5}}, 0x20) (async) openat$bsg(0xffffffffffffff9c, &(0x7f00000001c0), 0x80a02, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000580), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_MIGRATE_ID(r2, &(0x7f00000005c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000540), 0xffffffffffffffff, r3}}, 0x18) (async) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f0000000480)={0x5, 0x10, 0xfa00, {&(0x7f0000000200), r1, 0x1}}, 0x18) (async) fsconfig$FSCONFIG_SET_BINARY(0xffffffffffffffff, 0x2, &(0x7f0000000000)='-\x00', &(0x7f0000000040)="8dc1d82df3750ddd7d8a3476f12555cc4c93b34267d99968441eff4c33f9e1bddc2d0b641e0c4e955b6823a06949a0462b06ab38084f0980d0c223eb199e0a3ac6fb03a361420a2d36ed94ef7338157e4883bfc680d10fc44d66f11336c796b8209cf3386757a4bdd26571ab4597463a774aeb6130e72b9a161437a044f968bfec31daa2ab6e6d3b2eedac8a264ac6a02afbac5991d977da125041cf689191e7649424d436b82fa795d48b2a69c49619b77512ff1d5cb698", 0xb8) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100), 0x13d, 0x9}}, 0x20) (async) openat$null(0xffffffffffffff9c, &(0x7f0000000180), 0x488000, 0x0) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f00000004c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x7ff, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0xffb}, {0xa, 0x4e23, 0x80000000, @empty, 0x8000}, r4, 0xfff}}, 0x48) (async) 14:44:45 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x4000000, 0x0, "13bd94e32c37a3932d8ad7271907f2903ccf3bb13b387d8fdf025cdf3c8faa37a970ea456fa2fd6f8354fc3b05088269a6d5b022e392b9bd78e5e2308e054c3e2cbb6e61b42c74f3c1ba8d63d10ed85dcc5d58071547cdfd9661f05024bcf8d7722e987a76fced66d3b33373d61da648b231fe3de6f7dc9a78420b7bf0a04efb660e06f2bf671a2060d09d80f7ee6ba3ae0b6edf87d14be34012ef95719e01f065ec7943a48dcce0fcf8f7f3a89c24d940f201c7c73a3c97872a80ca25d1a3114fe16f225f4f55f3c6456cab8f0aa59d8efdc6939eb7f2b223ceff25db5222ff8e86c024229beec9ce765151d6e706fd60ab8ffe4c2e736eec4bcae53c1aaaef"}}}, 0x20000260) 14:44:45 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "e0b3772264c43c79ea3709d20d36cc4637f10fb5de2d44e0a73f520c3612063189eaba7b99fa9556bcac2ba1fb34035db66efe1e7ea748d786f601d0dcc0875cb8313c7db8b6c64b414bd5a06373bc3fbdf80ab140bf4b8f6c4a991196664cd95bbff1abeb0e982cc9b17aac4b0381a35d7a53d098e99e432a3b2f69c8b9abd7356e7cc0700ff8a36c56bf3e8a01564cd35c263749dc7c61c59645ecda836dc9f9771ff0fcdeec9e4d22cc1722bacd35e0096e747dac83ef85aed84e433e8b13e27f70ad877ff1a53934e230ed382a6c4ff7a6c1d3bb2cee4b336dcd368e29a06ed88efe1806f129bfbdfccf6c5e3ba935eb8ad0af3928b311e0a1c89eca9c75"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}}, 0x120) 14:44:45 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r1) r2 = syz_io_uring_setup(0x4e3c, &(0x7f0000000000)={0x0, 0x7fc3, 0x20, 0x3, 0x20c, 0x0, r0}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) r3 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/attr/sockcreate\x00', 0x2, 0x0) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000280)=[r2, r0, r0, r0, r3], 0x5) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) (async) openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) (async) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r1) (async) syz_io_uring_setup(0x4e3c, &(0x7f0000000000)={0x0, 0x7fc3, 0x20, 0x3, 0x20c, 0x0, r0}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) (async) openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/attr/sockcreate\x00', 0x2, 0x0) (async) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000280)=[r2, r0, r0, r0, r3], 0x5) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) (async) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) (async) 14:44:45 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) mmap$IORING_OFF_SQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r1) ioctl$BINDER_THREAD_EXIT(r1, 0x40046208, 0x0) 14:44:45 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "13bd94e32c37a3932d8ad7271907f2903ccf3bb13b387d8fdf025cdf3c8faa37a970ea456fa2fd6f8354fc3b05088269a6d5b022e392b9bd78e5e2308e054c3e2cbb6e61b42c74f3c1ba8d63d10ed85dcc5d58071547cdfd9661f05024bcf8d7722e987a76fced66d3b33373d61da648b231fe3de6f7dc9a78420b7bf0a04efb660e06f2bf671a2060d09d80f7ee6ba3ae0b6edf87d14be34012ef95719e01f065ec7943a48dcce0fcf8f7f3a89c24d940f201c7c73a3c97872a80ca25d1a3114fe16f225f4f55f3c6456cab8f0aa59d8efdc6939eb7f2b223ceff25db5222ff8e86c024229beec9ce765151d6e706fd60ab8ffe4c2e736eec4bcae53c1aaaef", 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}}, 0x120) 14:44:45 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000400)={0xffffffffffffffff}, 0x2, 0x5}}, 0x20) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f00000001c0), 0x80a02, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000580), 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r2, &(0x7f00000005c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000540), 0xffffffffffffffff, r3}}, 0x18) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f0000000480)={0x5, 0x10, 0xfa00, {&(0x7f0000000200), r1, 0x1}}, 0x18) fsconfig$FSCONFIG_SET_BINARY(0xffffffffffffffff, 0x2, &(0x7f0000000000)='-\x00', &(0x7f0000000040)="8dc1d82df3750ddd7d8a3476f12555cc4c93b34267d99968441eff4c33f9e1bddc2d0b641e0c4e955b6823a06949a0462b06ab38084f0980d0c223eb199e0a3ac6fb03a361420a2d36ed94ef7338157e4883bfc680d10fc44d66f11336c796b8209cf3386757a4bdd26571ab4597463a774aeb6130e72b9a161437a044f968bfec31daa2ab6e6d3b2eedac8a264ac6a02afbac5991d977da125041cf689191e7649424d436b82fa795d48b2a69c49619b77512ff1d5cb698", 0xb8) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x13d, 0x9}}, 0x20) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000180), 0x488000, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f00000004c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x7ff, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0xffb}, {0xa, 0x4e23, 0x80000000, @empty, 0x8000}, r4, 0xfff}}, 0x48) openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000400), 0x2, 0x5}}, 0x20) (async) openat$bsg(0xffffffffffffff9c, &(0x7f00000001c0), 0x80a02, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000580), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_MIGRATE_ID(r2, &(0x7f00000005c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000540), 0xffffffffffffffff, r3}}, 0x18) (async) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f0000000480)={0x5, 0x10, 0xfa00, {&(0x7f0000000200), r1, 0x1}}, 0x18) (async) fsconfig$FSCONFIG_SET_BINARY(0xffffffffffffffff, 0x2, &(0x7f0000000000)='-\x00', &(0x7f0000000040)="8dc1d82df3750ddd7d8a3476f12555cc4c93b34267d99968441eff4c33f9e1bddc2d0b641e0c4e955b6823a06949a0462b06ab38084f0980d0c223eb199e0a3ac6fb03a361420a2d36ed94ef7338157e4883bfc680d10fc44d66f11336c796b8209cf3386757a4bdd26571ab4597463a774aeb6130e72b9a161437a044f968bfec31daa2ab6e6d3b2eedac8a264ac6a02afbac5991d977da125041cf689191e7649424d436b82fa795d48b2a69c49619b77512ff1d5cb698", 0xb8) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100), 0x13d, 0x9}}, 0x20) (async) openat$null(0xffffffffffffff9c, &(0x7f0000000180), 0x488000, 0x0) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f00000004c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x7ff, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0xffb}, {0xa, 0x4e23, 0x80000000, @empty, 0x8000}, r4, 0xfff}}, 0x48) (async) [ 3592.405857][ T4926] R13: 00007ffe952cf46f R14: 00007f9e8ccb3300 R15: 0000000000022000 [ 3592.413844][ T4926] [ 3592.459510][ T4982] FAULT_INJECTION: forcing a failure. [ 3592.459510][ T4982] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3592.472646][ T4982] CPU: 0 PID: 4982 Comm: syz-executor.0 Not tainted 5.17.0-rc2-syzkaller-00167-gdcb85f85fa6f-dirty #0 [ 3592.483610][ T4982] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3592.493722][ T4982] Call Trace: [ 3592.497000][ T4982] [ 3592.499928][ T4982] dump_stack_lvl+0xd6/0x122 [ 3592.504534][ T4982] dump_stack+0x11/0x1b 14:44:45 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) bind$pptp(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x2, {0x2, @multicast1}}, 0x1e) r1 = geteuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f00000000c0)={0x55, 0x7d, 0x2, {{0x0, 0x40, 0x1, 0x6, {0x40, 0x0, 0x2}, 0x40000000, 0x4, 0x36, 0x5, 0x0, '', 0x9, ']\',\'@\'[\x96\x16', 0x2, '):', 0x2, '-&'}, 0x0, '', 0x0, r0, r1}}, 0x55) [ 3592.508706][ T4982] should_fail+0x23c/0x250 [ 3592.513130][ T4982] should_fail_usercopy+0x16/0x20 [ 3592.518162][ T4982] copy_page_from_iter_atomic+0x2f1/0xcd0 [ 3592.524029][ T4982] ? shmem_write_begin+0x7e/0x100 [ 3592.529110][ T4982] generic_perform_write+0x211/0x400 [ 3592.534391][ T4982] ? shmem_write_begin+0x100/0x100 [ 3592.539559][ T4982] __generic_file_write_iter+0xf7/0x2b0 [ 3592.545152][ T4982] ? generic_write_checks+0x242/0x290 [ 3592.550650][ T4982] generic_file_write_iter+0x75/0x130 14:44:45 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) mmap$IORING_OFF_SQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r1) ioctl$BINDER_THREAD_EXIT(r1, 0x40046208, 0x0) openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) (async) socket$inet_sctp(0x2, 0x5, 0x84) (async) mmap$IORING_OFF_SQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0x0) (async) openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) (async) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r1) (async) ioctl$BINDER_THREAD_EXIT(r1, 0x40046208, 0x0) (async) 14:44:45 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "e0b3772264c43c79ea3709d20d36cc4637f10fb5de2d44e0a73f520c3612063189eaba7b99fa9556bcac2ba1fb34035db66efe1e7ea748d786f601d0dcc0875cb8313c7db8b6c64b414bd5a06373bc3fbdf80ab140bf4b8f6c4a991196664cd95bbff1abeb0e982cc9b17aac4b0381a35d7a53d098e99e432a3b2f69c8b9abd7356e7cc0700ff8a36c56bf3e8a01564cd35c263749dc7c61c59645ecda836dc9f9771ff0fcdeec9e4d22cc1722bacd35e0096e747dac83ef85aed84e433e8b13e27f70ad877ff1a53934e230ed382a6c4ff7a6c1d3bb2cee4b336dcd368e29a06ed88efe1806f129bfbdfccf6c5e3ba935eb8ad0af3928b311e0a1c89eca9c75"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}}}, 0x120) 14:44:45 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) (async) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r1) (async) r2 = syz_io_uring_setup(0x4e3c, &(0x7f0000000000)={0x0, 0x7fc3, 0x20, 0x3, 0x20c, 0x0, r0}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) (async) r3 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/attr/sockcreate\x00', 0x2, 0x0) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000280)=[r2, r0, r0, r0, r3], 0x5) (async, rerun: 64) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) (async, rerun: 64) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "13bd94e32c37a3932d8ad7271907f2903ccf3bb13b387d8fdf025cdf3c8faa37a970ea456fa2fd6f8354fc3b05088269a6d5b022e392b9bd78e5e2308e054c3e2cbb6e61b42c74f3c1ba8d63d10ed85dcc5d58071547cdfd9661f05024bcf8d7722e987a76fced66d3b33373d61da648b231fe3de6f7dc9a78420b7bf0a04efb660e06f2bf671a2060d09d80f7ee6ba3ae0b6edf87d14be34012ef95719e01f065ec7943a48dcce0fcf8f7f3a89c24d940f201c7c73a3c97872a80ca25d1a3114fe16f225f4f55f3c6456cab8f0aa59d8efdc6939eb7f2b223ceff25db5222ff8e86c024229beec9ce765151d6e706fd60ab8ffe4c2e736eec4bcae53c1aaaef"}}}, 0x120) [ 3592.556018][ T4982] vfs_write+0x7f5/0x950 [ 3592.560323][ T4982] ksys_write+0xd9/0x190 [ 3592.564571][ T4982] __x64_sys_write+0x3e/0x50 [ 3592.569154][ T4982] do_syscall_64+0x44/0xd0 [ 3592.573587][ T4982] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3592.579552][ T4982] RIP: 0033:0x7f9e8db3d059 [ 3592.583972][ T4982] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 3592.603687][ T4982] RSP: 002b:00007f9e8ccb3168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3592.612186][ T4982] RAX: ffffffffffffffda RBX: 00007f9e8dc4ff60 RCX: 00007f9e8db3d059 [ 3592.620158][ T4982] RDX: 0000000020000260 RSI: 0000000020000140 RDI: 0000000000000003 [ 3592.628144][ T4982] RBP: 00007f9e8ccb31d0 R08: 0000000000000000 R09: 0000000000000000 [ 3592.636108][ T4982] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3592.644134][ T4982] R13: 00007ffe952cf46f R14: 00007f9e8ccb3300 R15: 0000000000022000 [ 3592.652109][ T4982] 14:44:45 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x20000260) (fail_nth: 42) 14:44:45 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x7, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "fdfb7d", "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"}}, 0x110) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "13bd94e32c37a3932d8ad7271907f2903ccf3bb13b387d8fdf025cdf3c8faa37a970ea456fa2fd6f8354fc3b05088269a6d5b022e392b9bd78e5e2308e054c3e2cbb6e61b42c74f3c1ba8d63d10ed85dcc5d58071547cdfd9661f05024bcf8d7722e987a76fced66d3b33373d61da648b231fe3de6f7dc9a78420b7bf0a04efb660e06f2bf671a2060d09d80f7ee6ba3ae0b6edf87d14be34012ef95719e01f065ec7943a48dcce0fcf8f7f3a89c24d940f201c7c73a3c97872a80ca25d1a3114fe16f225f4f55f3c6456cab8f0aa59d8efdc6939eb7f2b223ceff25db5222ff8e86c024229beec9ce765151d6e706fd60ab8ffe4c2e736eec4bcae53c1aaaef"}}}, 0x120) 14:44:45 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x5000000, 0x0, "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"}}}, 0x20000260) 14:44:45 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) (async) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) (async) bind$pptp(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x2, {0x2, @multicast1}}, 0x1e) (async) r1 = geteuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f00000000c0)={0x55, 0x7d, 0x2, {{0x0, 0x40, 0x1, 0x6, {0x40, 0x0, 0x2}, 0x40000000, 0x4, 0x36, 0x5, 0x0, '', 0x9, ']\',\'@\'[\x96\x16', 0x2, '):', 0x2, '-&'}, 0x0, '', 0x0, r0, r1}}, 0x55) 14:44:45 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) mmap$IORING_OFF_SQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r1) ioctl$BINDER_THREAD_EXIT(r1, 0x40046208, 0x0) openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) (async) socket$inet_sctp(0x2, 0x5, 0x84) (async) mmap$IORING_OFF_SQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0x0) (async) openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) (async) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r1) (async) ioctl$BINDER_THREAD_EXIT(r1, 0x40046208, 0x0) (async) 14:44:45 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}, 0x120) 14:44:45 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r2}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x800, @loopback, 0x5}, {0xa, 0x4e23, 0x1ff, @loopback, 0x4}, r2, 0x2}}, 0x48) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040), 0x5a221, 0x0) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r4) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000180), 0x48800, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r5, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3, {0xee00, 0xee00}}, './file0\x00'}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ff2000/0xe000)=nil, 0xe000, 0x6, 0x2010, r5, 0x0) pipe2$9p(&(0x7f0000000000), 0x80800) write$RDMA_USER_CM_CMD_JOIN_MCAST(r5, &(0x7f0000000300)={0x16, 0x98, 0xfa00, {&(0x7f0000000200), 0x0, r2, 0x30, 0x1, @ib={0x1b, 0x0, 0x6, {"4006f6a88a11394f698b78445210ad61"}, 0x5, 0x0, 0x4f}}}, 0xa0) [ 3592.785252][ T5030] FAULT_INJECTION: forcing a failure. [ 3592.785252][ T5030] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3592.798651][ T5030] CPU: 0 PID: 5030 Comm: syz-executor.0 Not tainted 5.17.0-rc2-syzkaller-00167-gdcb85f85fa6f-dirty #0 [ 3592.809588][ T5030] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3592.819651][ T5030] Call Trace: [ 3592.822953][ T5030] [ 3592.825884][ T5030] dump_stack_lvl+0xd6/0x122 [ 3592.830548][ T5030] dump_stack+0x11/0x1b [ 3592.834752][ T5030] should_fail+0x23c/0x250 [ 3592.839172][ T5030] __alloc_pages+0x102/0x330 [ 3592.843867][ T5030] alloc_pages_vma+0x67e/0x810 [ 3592.848638][ T5030] ? percpu_counter_add_batch+0x109/0x130 [ 3592.854358][ T5030] shmem_getpage_gfp+0x8b4/0x12c0 [ 3592.859424][ T5030] ? do_user_addr_fault+0x7d4/0xb90 [ 3592.864687][ T5030] shmem_write_begin+0x7e/0x100 [ 3592.869539][ T5030] generic_perform_write+0x1c8/0x400 [ 3592.874830][ T5030] ? shmem_write_begin+0x100/0x100 [ 3592.880019][ T5030] __generic_file_write_iter+0xf7/0x2b0 [ 3592.885583][ T5030] ? generic_write_checks+0x242/0x290 [ 3592.890959][ T5030] generic_file_write_iter+0x75/0x130 [ 3592.896335][ T5030] vfs_write+0x7f5/0x950 [ 3592.900624][ T5030] ksys_write+0xd9/0x190 [ 3592.904931][ T5030] __x64_sys_write+0x3e/0x50 [ 3592.909520][ T5030] do_syscall_64+0x44/0xd0 [ 3592.913936][ T5030] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3592.919934][ T5030] RIP: 0033:0x7f9e8db3d059 14:44:46 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}}}, 0x120) 14:44:46 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x6000000, 0x0, "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"}}}, 0x20000260) 14:44:46 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x7, 0x0, 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "fdfb7d", "e0b3772264c43c79ea3709d20d36cc4637f10fb5de2d44e0a73f520c3612063189eaba7b99fa9556bcac2ba1fb34035db66efe1e7ea748d786f601d0dcc0875cb8313c7db8b6c64b414bd5a06373bc3fbdf80ab140bf4b8f6c4a991196664cd95bbff1abeb0e982cc9b17aac4b0381a35d7a53d098e99e432a3b2f69c8b9abd7356e7cc0700ff8a36c56bf3e8a01564cd35c263749dc7c61c59645ecda836dc9f9771ff0fcdeec9e4d22cc1722bacd35e0096e747dac83ef85aed84e433e8b13e27f70ad877ff1a53934e230ed382a6c4ff7a6c1d3bb2cee4b336dcd368e29a06ed88efe1806f129bfbdfccf6c5e3ba935eb8ad0af3928b311e0a1c89eca9c75"}}, 0x110) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) 14:44:46 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) (async) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) (async) bind$pptp(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0x2, {0x2, @multicast1}}, 0x1e) (async) r1 = geteuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f00000000c0)={0x55, 0x7d, 0x2, {{0x0, 0x40, 0x1, 0x6, {0x40, 0x0, 0x2}, 0x40000000, 0x4, 0x36, 0x5, 0x0, '', 0x9, ']\',\'@\'[\x96\x16', 0x2, '):', 0x2, '-&'}, 0x0, '', 0x0, r0, r1}}, 0x55) 14:44:46 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) [ 3592.924467][ T5030] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 3592.944096][ T5030] RSP: 002b:00007f9e8ccb3168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3592.952514][ T5030] RAX: ffffffffffffffda RBX: 00007f9e8dc4ff60 RCX: 00007f9e8db3d059 [ 3592.960487][ T5030] RDX: 0000000020000260 RSI: 0000000020000140 RDI: 0000000000000003 [ 3592.968457][ T5030] RBP: 00007f9e8ccb31d0 R08: 0000000000000000 R09: 0000000000000000 [ 3592.976435][ T5030] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 14:44:46 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x20000260) (fail_nth: 43) 14:44:46 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "13bd94e32c37a3932d8ad7271907f2903ccf3bb13b387d8fdf025cdf3c8faa37a970ea456fa2fd6f8354fc3b05088269a6d5b022e392b9bd78e5e2308e054c3e2cbb6e61b42c74f3c1ba8d63d10ed85dcc5d58071547cdfd9661f05024bcf8d7722e987a76fced66d3b33373d61da648b231fe3de6f7dc9a78420b7bf0a04efb660e06f2bf671a2060d09d80f7ee6ba3ae0b6edf87d14be34012ef95719e01f065ec7943a48dcce0fcf8f7f3a89c24d940f201c7c73a3c97872a80ca25d1a3114fe16f225f4f55f3c6456cab8f0aa59d8efdc6939eb7f2b223ceff25db5222ff8e86c024229beec9ce765151d6e706fd60ab8ffe4c2e736eec4bcae53c1aaaef", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}}, 0x120) 14:44:46 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r2}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x800, @loopback, 0x5}, {0xa, 0x4e23, 0x1ff, @loopback, 0x4}, r2, 0x2}}, 0x48) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040), 0x5a221, 0x0) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r4) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000180), 0x48800, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r5, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3, {0xee00, 0xee00}}, './file0\x00'}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ff2000/0xe000)=nil, 0xe000, 0x6, 0x2010, r5, 0x0) pipe2$9p(&(0x7f0000000000), 0x80800) write$RDMA_USER_CM_CMD_JOIN_MCAST(r5, &(0x7f0000000300)={0x16, 0x98, 0xfa00, {&(0x7f0000000200), 0x0, r2, 0x30, 0x1, @ib={0x1b, 0x0, 0x6, {"4006f6a88a11394f698b78445210ad61"}, 0x5, 0x0, 0x4f}}}, 0xa0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r2}}, 0x10) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x800, @loopback, 0x5}, {0xa, 0x4e23, 0x1ff, @loopback, 0x4}, r2, 0x2}}, 0x48) (async) openat$bsg(0xffffffffffffff9c, &(0x7f0000000040), 0x5a221, 0x0) (async) openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) (async) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r4) (async) openat$null(0xffffffffffffff9c, &(0x7f0000000180), 0x48800, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r5, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3, {0xee00, 0xee00}}, './file0\x00'}) (async) mmap$IORING_OFF_SQ_RING(&(0x7f0000ff2000/0xe000)=nil, 0xe000, 0x6, 0x2010, r5, 0x0) (async) pipe2$9p(&(0x7f0000000000), 0x80800) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r5, &(0x7f0000000300)={0x16, 0x98, 0xfa00, {&(0x7f0000000200), 0x0, r2, 0x30, 0x1, @ib={0x1b, 0x0, 0x6, {"4006f6a88a11394f698b78445210ad61"}, 0x5, 0x0, 0x4f}}}, 0xa0) (async) 14:44:46 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000)={0xffffffffffffffff}, 0x111, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(0xffffffffffffffff, &(0x7f0000000080)={0xf, 0x8, 0xfa00, {r1, 0x6}}, 0x10) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r3) fsmount(r3, 0x0, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r5, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r6}}, 0x10) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r3, &(0x7f00000001c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000300), r6, 0x2}}, 0x18) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r2) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x2, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f0000000180)={0x10, 0x30, 0xfa00, {&(0x7f00000000c0), 0x2, {0xa, 0x4e24, 0x8, @mcast2, 0x14}, r7}}, 0x38) [ 3592.984434][ T5030] R13: 00007ffe952cf46f R14: 00007f9e8ccb3300 R15: 0000000000022000 [ 3592.992408][ T5030] 14:44:46 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000)={0xffffffffffffffff}, 0x111, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(0xffffffffffffffff, &(0x7f0000000080)={0xf, 0x8, 0xfa00, {r1, 0x6}}, 0x10) (async, rerun: 64) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) (async, rerun: 64) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r3) fsmount(r3, 0x0, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async, rerun: 32) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) (rerun: 32) write$RDMA_USER_CM_CMD_NOTIFY(r5, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r6}}, 0x10) (async) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r3, &(0x7f00000001c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000300), r6, 0x2}}, 0x18) (async, rerun: 64) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r2) (async, rerun: 64) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x2, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f0000000180)={0x10, 0x30, 0xfa00, {&(0x7f00000000c0), 0x2, {0xa, 0x4e24, 0x8, @mcast2, 0x14}, r7}}, 0x38) 14:44:46 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r2}}, 0x10) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x800, @loopback, 0x5}, {0xa, 0x4e23, 0x1ff, @loopback, 0x4}, r2, 0x2}}, 0x48) (async) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040), 0x5a221, 0x0) (async) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r4) (async) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000180), 0x48800, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r5, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3, {0xee00, 0xee00}}, './file0\x00'}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ff2000/0xe000)=nil, 0xe000, 0x6, 0x2010, r5, 0x0) pipe2$9p(&(0x7f0000000000), 0x80800) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r5, &(0x7f0000000300)={0x16, 0x98, 0xfa00, {&(0x7f0000000200), 0x0, r2, 0x30, 0x1, @ib={0x1b, 0x0, 0x6, {"4006f6a88a11394f698b78445210ad61"}, 0x5, 0x0, 0x4f}}}, 0xa0) [ 3593.033502][ T5065] FAULT_INJECTION: forcing a failure. [ 3593.033502][ T5065] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3593.046631][ T5065] CPU: 1 PID: 5065 Comm: syz-executor.0 Not tainted 5.17.0-rc2-syzkaller-00167-gdcb85f85fa6f-dirty #0 [ 3593.057572][ T5065] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3593.067668][ T5065] Call Trace: [ 3593.070953][ T5065] [ 3593.073877][ T5065] dump_stack_lvl+0xd6/0x122 [ 3593.078503][ T5065] dump_stack+0x11/0x1b 14:44:46 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x7, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "fdfb7d", "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"}}, 0x110) (async) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "13bd94e32c37a3932d8ad7271907f2903ccf3bb13b387d8fdf025cdf3c8faa37a970ea456fa2fd6f8354fc3b05088269a6d5b022e392b9bd78e5e2308e054c3e2cbb6e61b42c74f3c1ba8d63d10ed85dcc5d58071547cdfd9661f05024bcf8d7722e987a76fced66d3b33373d61da648b231fe3de6f7dc9a78420b7bf0a04efb660e06f2bf671a2060d09d80f7ee6ba3ae0b6edf87d14be34012ef95719e01f065ec7943a48dcce0fcf8f7f3a89c24d940f201c7c73a3c97872a80ca25d1a3114fe16f225f4f55f3c6456cab8f0aa59d8efdc6939eb7f2b223ceff25db5222ff8e86c024229beec9ce765151d6e706fd60ab8ffe4c2e736eec4bcae53c1aaaef"}}}, 0x120) 14:44:46 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0xe0181, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r1) r2 = socket$nl_rdma(0x10, 0x3, 0x14) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000080)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYRES32, @ANYRES32, @ANYBLOB="080001003000be2bc9bfdef8afca2b1a8a1322c6baf642d1b6d1babd739528a52b298babe24966a32ec1c5ba9e0f2fe3ccc70b1b3c94e0d7b6b91b9f8bc8e63c9e34000000000000000000"]) [ 3593.082670][ T5065] should_fail+0x23c/0x250 [ 3593.087156][ T5065] should_fail_usercopy+0x16/0x20 [ 3593.092226][ T5065] copy_page_from_iter_atomic+0x2f1/0xcd0 [ 3593.097957][ T5065] ? shmem_write_begin+0x7e/0x100 [ 3593.102979][ T5065] generic_perform_write+0x211/0x400 [ 3593.108273][ T5065] ? shmem_write_begin+0x100/0x100 [ 3593.113435][ T5065] __generic_file_write_iter+0xf7/0x2b0 [ 3593.119062][ T5065] ? generic_write_checks+0x242/0x290 [ 3593.124461][ T5065] generic_file_write_iter+0x75/0x130 [ 3593.129913][ T5065] vfs_write+0x7f5/0x950 [ 3593.134157][ T5065] ksys_write+0xd9/0x190 [ 3593.138410][ T5065] __x64_sys_write+0x3e/0x50 [ 3593.143043][ T5065] do_syscall_64+0x44/0xd0 [ 3593.147523][ T5065] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3593.153421][ T5065] RIP: 0033:0x7f9e8db3d059 [ 3593.157830][ T5065] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 14:44:46 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x6040000, 0x0, "13bd94e32c37a3932d8ad7271907f2903ccf3bb13b387d8fdf025cdf3c8faa37a970ea456fa2fd6f8354fc3b05088269a6d5b022e392b9bd78e5e2308e054c3e2cbb6e61b42c74f3c1ba8d63d10ed85dcc5d58071547cdfd9661f05024bcf8d7722e987a76fced66d3b33373d61da648b231fe3de6f7dc9a78420b7bf0a04efb660e06f2bf671a2060d09d80f7ee6ba3ae0b6edf87d14be34012ef95719e01f065ec7943a48dcce0fcf8f7f3a89c24d940f201c7c73a3c97872a80ca25d1a3114fe16f225f4f55f3c6456cab8f0aa59d8efdc6939eb7f2b223ceff25db5222ff8e86c024229beec9ce765151d6e706fd60ab8ffe4c2e736eec4bcae53c1aaaef"}}}, 0x20000260) 14:44:46 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "13bd94e32c37a3932d8ad7271907f2903ccf3bb13b387d8fdf025cdf3c8faa37a970ea456fa2fd6f8354fc3b05088269a6d5b022e392b9bd78e5e2308e054c3e2cbb6e61b42c74f3c1ba8d63d10ed85dcc5d58071547cdfd9661f05024bcf8d7722e987a76fced66d3b33373d61da648b231fe3de6f7dc9a78420b7bf0a04efb660e06f2bf671a2060d09d80f7ee6ba3ae0b6edf87d14be34012ef95719e01f065ec7943a48dcce0fcf8f7f3a89c24d940f201c7c73a3c97872a80ca25d1a3114fe16f225f4f55f3c6456cab8f0aa59d8efdc6939eb7f2b223ceff25db5222ff8e86c024229beec9ce765151d6e706fd60ab8ffe4c2e736eec4bcae53c1aaaef", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}}, 0x120) 14:44:46 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$devlink(&(0x7f0000000300), 0xffffffffffffffff) r4 = socket$inet(0x2, 0xa, 0x4dac) ioctl$ifreq_SIOCGIFINDEX_vcan(r4, 0x8933, &(0x7f0000000680)={'vxcan1\x00'}) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_SET(r2, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000340)={&(0x7f0000000500)={0x150, r3, 0x100, 0x70bd2b, 0x25dfdbff, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8, 0xb, 0x9}, {0x6, 0x16, 0x7ff}, {0x5}, {0x6, 0x11, 0x81}, {0x8, 0xb, 0x20}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x8}, {0x6, 0x16, 0x8}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0x5}, {0x8}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x3}}, {0x8, 0xb, 0x91}, {0x6, 0x16, 0x8}, {0x5}, {0x6, 0x11, 0xff}, {0x8, 0xb, 0x20}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x3}}, {0x8, 0xb, 0x4}, {0x6, 0x16, 0x800}, {0x5}, {0x6, 0x11, 0x8}, {0x8, 0xb, 0xa79a}}]}, 0x150}, 0x1, 0x0, 0x0, 0x40010}, 0x4048040) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r5, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r6}}, 0x10) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f00000000c0)={0xb, 0x10, 0xfa00, {&(0x7f0000000000), r6, 0x5}}, 0x18) 14:44:46 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0xe0181, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r1) r2 = socket$nl_rdma(0x10, 0x3, 0x14) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000080)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYRES32, @ANYRES32, @ANYBLOB="080001003000be2bc9bfdef8afca2b1a8a1322c6baf642d1b6d1babd739528a52b298babe24966a32ec1c5ba9e0f2fe3ccc70b1b3c94e0d7b6b91b9f8bc8e63c9e34000000000000000000"]) [ 3593.177443][ T5065] RSP: 002b:00007f9e8ccb3168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3593.185914][ T5065] RAX: ffffffffffffffda RBX: 00007f9e8dc4ff60 RCX: 00007f9e8db3d059 [ 3593.193893][ T5065] RDX: 0000000020000260 RSI: 0000000020000140 RDI: 0000000000000003 [ 3593.201868][ T5065] RBP: 00007f9e8ccb31d0 R08: 0000000000000000 R09: 0000000000000000 [ 3593.209870][ T5065] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3593.217842][ T5065] R13: 00007ffe952cf46f R14: 00007f9e8ccb3300 R15: 0000000000022000 [ 3593.225863][ T5065] 14:44:46 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x20000260) (fail_nth: 44) 14:44:46 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0xe0181, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r1) r2 = socket$nl_rdma(0x10, 0x3, 0x14) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000080)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYRES32, @ANYRES32, @ANYBLOB="080001003000be2bc9bfdef8afca2b1a8a1322c6baf642d1b6d1babd739528a52b298babe24966a32ec1c5ba9e0f2fe3ccc70b1b3c94e0d7b6b91b9f8bc8e63c9e34000000000000000000"]) openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0xe0181, 0x0) (async) mmap$IORING_OFF_SQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0x0) (async) openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) (async) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r1) (async) socket$nl_rdma(0x10, 0x3, 0x14) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000080)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYRES32, @ANYRES32, @ANYBLOB="080001003000be2bc9bfdef8afca2b1a8a1322c6baf642d1b6d1babd739528a52b298babe24966a32ec1c5ba9e0f2fe3ccc70b1b3c94e0d7b6b91b9f8bc8e63c9e34000000000000000000"]) (async) 14:44:46 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "e0b3772264c43c79ea3709d20d36cc4637f10fb5de2d44e0a73f520c3612063189eaba7b99fa9556bcac2ba1fb34035db66efe1e7ea748d786f601d0dcc0875cb8313c7db8b6c64b414bd5a06373bc3fbdf80ab140bf4b8f6c4a991196664cd95bbff1abeb0e982cc9b17aac4b0381a35d7a53d098e99e432a3b2f69c8b9abd7356e7cc0700ff8a36c56bf3e8a01564cd35c263749dc7c61c59645ecda836dc9f9771ff0fcdeec9e4d22cc1722bacd35e0096e747dac83ef85aed84e433e8b13e27f70ad877ff1a53934e230ed382a6c4ff7a6c1d3bb2cee4b336dcd368e29a06ed88efe1806f129bfbdfccf6c5e3ba935eb8ad0af3928b311e0a1c89eca9c75"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}}}, 0x120) 14:44:46 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "e0b3772264c43c79ea3709d20d36cc4637f10fb5de2d44e0a73f520c3612063189eaba7b99fa9556bcac2ba1fb34035db66efe1e7ea748d786f601d0dcc0875cb8313c7db8b6c64b414bd5a06373bc3fbdf80ab140bf4b8f6c4a991196664cd95bbff1abeb0e982cc9b17aac4b0381a35d7a53d098e99e432a3b2f69c8b9abd7356e7cc0700ff8a36c56bf3e8a01564cd35c263749dc7c61c59645ecda836dc9f9771ff0fcdeec9e4d22cc1722bacd35e0096e747dac83ef85aed84e433e8b13e27f70ad877ff1a53934e230ed382a6c4ff7a6c1d3bb2cee4b336dcd368e29a06ed88efe1806f129bfbdfccf6c5e3ba935eb8ad0af3928b311e0a1c89eca9c75"}}, 0x110) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "13bd94e32c37a3932d8ad7271907f2903ccf3bb13b387d8fdf025cdf3c8faa37a970ea456fa2fd6f8354fc3b05088269a6d5b022e392b9bd78e5e2308e054c3e2cbb6e61b42c74f3c1ba8d63d10ed85dcc5d58071547cdfd9661f05024bcf8d7722e987a76fced66d3b33373d61da648b231fe3de6f7dc9a78420b7bf0a04efb660e06f2bf671a2060d09d80f7ee6ba3ae0b6edf87d14be34012ef95719e01f065ec7943a48dcce0fcf8f7f3a89c24d940f201c7c73a3c97872a80ca25d1a3114fe16f225f4f55f3c6456cab8f0aa59d8efdc6939eb7f2b223ceff25db5222ff8e86c024229beec9ce765151d6e706fd60ab8ffe4c2e736eec4bcae53c1aaaef"}}}, 0x120) (async) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) (async) r3 = syz_genetlink_get_family_id$devlink(&(0x7f0000000300), 0xffffffffffffffff) (async) r4 = socket$inet(0x2, 0xa, 0x4dac) ioctl$ifreq_SIOCGIFINDEX_vcan(r4, 0x8933, &(0x7f0000000680)={'vxcan1\x00'}) (async) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_SET(r2, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000340)={&(0x7f0000000500)={0x150, r3, 0x100, 0x70bd2b, 0x25dfdbff, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8, 0xb, 0x9}, {0x6, 0x16, 0x7ff}, {0x5}, {0x6, 0x11, 0x81}, {0x8, 0xb, 0x20}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x8}, {0x6, 0x16, 0x8}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0x5}, {0x8}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x3}}, {0x8, 0xb, 0x91}, {0x6, 0x16, 0x8}, {0x5}, {0x6, 0x11, 0xff}, {0x8, 0xb, 0x20}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x3}}, {0x8, 0xb, 0x4}, {0x6, 0x16, 0x800}, {0x5}, {0x6, 0x11, 0x8}, {0x8, 0xb, 0xa79a}}]}, 0x150}, 0x1, 0x0, 0x0, 0x40010}, 0x4048040) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r5, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r6}}, 0x10) (async) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f00000000c0)={0xb, 0x10, 0xfa00, {&(0x7f0000000000), r6, 0x5}}, 0x18) 14:44:46 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000)={0xffffffffffffffff}, 0x111, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(0xffffffffffffffff, &(0x7f0000000080)={0xf, 0x8, 0xfa00, {r1, 0x6}}, 0x10) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r3) fsmount(r3, 0x0, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r5, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r6}}, 0x10) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r3, &(0x7f00000001c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000300), r6, 0x2}}, 0x18) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r2) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x2, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f0000000180)={0x10, 0x30, 0xfa00, {&(0x7f00000000c0), 0x2, {0xa, 0x4e24, 0x8, @mcast2, 0x14}, r7}}, 0x38) openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000), 0x111, 0xa}}, 0x20) (async) write$RDMA_USER_CM_CMD_NOTIFY(0xffffffffffffffff, &(0x7f0000000080)={0xf, 0x8, 0xfa00, {r1, 0x6}}, 0x10) (async) openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) (async) openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) (async) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r3) (async) fsmount(r3, 0x0, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_NOTIFY(r5, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r6}}, 0x10) (async) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r3, &(0x7f00000001c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000300), r6, 0x2}}, 0x18) (async) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r2) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100), 0x2, 0x5}}, 0x20) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f0000000180)={0x10, 0x30, 0xfa00, {&(0x7f00000000c0), 0x2, {0xa, 0x4e24, 0x8, @mcast2, 0x14}, r7}}, 0x38) (async) 14:44:46 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r0) r1 = io_uring_setup(0x30c9, &(0x7f0000000000)={0x0, 0xf231, 0x18, 0x3, 0x7, 0x0, r0}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(r0, 0x40046210, &(0x7f00000000c0)) io_uring_register$IORING_REGISTER_EVENTFD(r1, 0x4, &(0x7f0000000080), 0x1) openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) 14:44:46 executing program 5: fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x553300, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2000002, 0x30, r0, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000080), 0x80600, 0x0) io_uring_register$IORING_REGISTER_PROBE(r1, 0x8, &(0x7f00000000c0)={0x0, 0x0, 0x0, '\x00', [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, 0x14) write$P9_RXATTRCREATE(r0, &(0x7f0000000000)={0x7, 0x21, 0x2}, 0x7) fsopen(&(0x7f0000000040)='overlay\x00', 0x1) [ 3593.399406][ T5122] FAULT_INJECTION: forcing a failure. [ 3593.399406][ T5122] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3593.412714][ T5122] CPU: 1 PID: 5122 Comm: syz-executor.0 Not tainted 5.17.0-rc2-syzkaller-00167-gdcb85f85fa6f-dirty #0 [ 3593.423648][ T5122] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3593.433696][ T5122] Call Trace: [ 3593.436968][ T5122] [ 3593.439900][ T5122] dump_stack_lvl+0xd6/0x122 [ 3593.444500][ T5122] dump_stack+0x11/0x1b [ 3593.448659][ T5122] should_fail+0x23c/0x250 [ 3593.453187][ T5122] __alloc_pages+0x102/0x330 [ 3593.457851][ T5122] alloc_pages_vma+0x67e/0x810 [ 3593.462605][ T5122] ? percpu_counter_add_batch+0x109/0x130 [ 3593.468324][ T5122] shmem_getpage_gfp+0x8b4/0x12c0 [ 3593.473533][ T5122] ? do_user_addr_fault+0x7d4/0xb90 [ 3593.478728][ T5122] shmem_write_begin+0x7e/0x100 [ 3593.483590][ T5122] generic_perform_write+0x1c8/0x400 [ 3593.488982][ T5122] ? shmem_write_begin+0x100/0x100 [ 3593.494108][ T5122] __generic_file_write_iter+0xf7/0x2b0 [ 3593.499648][ T5122] ? generic_write_checks+0x242/0x290 [ 3593.505050][ T5122] generic_file_write_iter+0x75/0x130 [ 3593.510460][ T5122] vfs_write+0x7f5/0x950 [ 3593.514693][ T5122] ksys_write+0xd9/0x190 [ 3593.519027][ T5122] __x64_sys_write+0x3e/0x50 [ 3593.523682][ T5122] do_syscall_64+0x44/0xd0 [ 3593.528266][ T5122] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3593.534154][ T5122] RIP: 0033:0x7f9e8db3d059 [ 3593.538559][ T5122] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 3593.558168][ T5122] RSP: 002b:00007f9e8ccb3168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3593.566574][ T5122] RAX: ffffffffffffffda RBX: 00007f9e8dc4ff60 RCX: 00007f9e8db3d059 [ 3593.574533][ T5122] RDX: 0000000020000260 RSI: 0000000020000140 RDI: 0000000000000003 [ 3593.582495][ T5122] RBP: 00007f9e8ccb31d0 R08: 0000000000000000 R09: 0000000000000000 [ 3593.590533][ T5122] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 14:44:46 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) (async) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) (async, rerun: 64) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async, rerun: 64) r2 = socket$nl_generic(0x10, 0x3, 0x10) (async) r3 = syz_genetlink_get_family_id$devlink(&(0x7f0000000300), 0xffffffffffffffff) (async) r4 = socket$inet(0x2, 0xa, 0x4dac) ioctl$ifreq_SIOCGIFINDEX_vcan(r4, 0x8933, &(0x7f0000000680)={'vxcan1\x00'}) (async) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_SET(r2, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000340)={&(0x7f0000000500)={0x150, r3, 0x100, 0x70bd2b, 0x25dfdbff, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8, 0xb, 0x9}, {0x6, 0x16, 0x7ff}, {0x5}, {0x6, 0x11, 0x81}, {0x8, 0xb, 0x20}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x8}, {0x6, 0x16, 0x8}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0x5}, {0x8}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x3}}, {0x8, 0xb, 0x91}, {0x6, 0x16, 0x8}, {0x5}, {0x6, 0x11, 0xff}, {0x8, 0xb, 0x20}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x3}}, {0x8, 0xb, 0x4}, {0x6, 0x16, 0x800}, {0x5}, {0x6, 0x11, 0x8}, {0x8, 0xb, 0xa79a}}]}, 0x150}, 0x1, 0x0, 0x0, 0x40010}, 0x4048040) (async) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r5, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r6}}, 0x10) (async, rerun: 64) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f00000000c0)={0xb, 0x10, 0xfa00, {&(0x7f0000000000), r6, 0x5}}, 0x18) (rerun: 64) 14:44:46 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x8000000, 0x0, "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"}}}, 0x20000260) 14:44:46 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}, 0x120) 14:44:46 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x20000260) (fail_nth: 45) 14:44:46 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r0) r1 = io_uring_setup(0x30c9, &(0x7f0000000000)={0x0, 0xf231, 0x18, 0x3, 0x7, 0x0, r0}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(r0, 0x40046210, &(0x7f00000000c0)) (async) io_uring_register$IORING_REGISTER_EVENTFD(r1, 0x4, &(0x7f0000000080), 0x1) openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) 14:44:46 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000140)={0x6, 0x16d, 0xfa00, {{0x0, 0xffff0001, "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", 0x0, 0x0, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x1}}}, 0x120) [ 3593.598493][ T5122] R13: 00007ffe952cf46f R14: 00007f9e8ccb3300 R15: 0000000000022000 [ 3593.606461][ T5122] 14:44:46 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}}}, 0x120) 14:44:46 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) (async) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000140)={0x6, 0x16d, 0xfa00, {{0x0, 0xffff0001, "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", 0x0, 0x0, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x1}}}, 0x120) 14:44:46 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) 14:44:46 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r0) (async, rerun: 64) r1 = io_uring_setup(0x30c9, &(0x7f0000000000)={0x0, 0xf231, 0x18, 0x3, 0x7, 0x0, r0}) (rerun: 64) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(r0, 0x40046210, &(0x7f00000000c0)) (async) io_uring_register$IORING_REGISTER_EVENTFD(r1, 0x4, &(0x7f0000000080), 0x1) (async) openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) 14:44:46 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "e0b3772264c43c79ea3709d20d36cc4637f10fb5de2d44e0a73f520c3612063189eaba7b99fa9556bcac2ba1fb34035db66efe1e7ea748d786f601d0dcc0875cb8313c7db8b6c64b414bd5a06373bc3fbdf80ab140bf4b8f6c4a991196664cd95bbff1abeb0e982cc9b17aac4b0381a35d7a53d098e99e432a3b2f69c8b9abd7356e7cc0700ff8a36c56bf3e8a01564cd35c263749dc7c61c59645ecda836dc9f9771ff0fcdeec9e4d22cc1722bacd35e0096e747dac83ef85aed84e433e8b13e27f70ad877ff1a53934e230ed382a6c4ff7a6c1d3bb2cee4b336dcd368e29a06ed88efe1806f129bfbdfccf6c5e3ba935eb8ad0af3928b311e0a1c89eca9c75"}}, 0x110) (async) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000140)={0x6, 0x16d, 0xfa00, {{0x0, 0xffff0001, "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", 0x0, 0x0, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x1}}}, 0x120) [ 3593.737828][ T5158] FAULT_INJECTION: forcing a failure. [ 3593.737828][ T5158] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3593.751041][ T5158] CPU: 1 PID: 5158 Comm: syz-executor.0 Not tainted 5.17.0-rc2-syzkaller-00167-gdcb85f85fa6f-dirty #0 [ 3593.761994][ T5158] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3593.772073][ T5158] Call Trace: [ 3593.775468][ T5158] [ 3593.778406][ T5158] dump_stack_lvl+0xd6/0x122 [ 3593.783096][ T5158] dump_stack+0x11/0x1b [ 3593.787274][ T5158] should_fail+0x23c/0x250 [ 3593.791740][ T5158] should_fail_usercopy+0x16/0x20 [ 3593.796836][ T5158] copy_page_from_iter_atomic+0x2f1/0xcd0 [ 3593.802581][ T5158] ? shmem_write_begin+0x7e/0x100 [ 3593.807681][ T5158] generic_perform_write+0x211/0x400 [ 3593.812982][ T5158] ? shmem_write_begin+0x100/0x100 [ 3593.818096][ T5158] __generic_file_write_iter+0xf7/0x2b0 [ 3593.823665][ T5158] ? generic_write_checks+0x242/0x290 [ 3593.829058][ T5158] generic_file_write_iter+0x75/0x130 14:44:46 executing program 5: fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) (async, rerun: 32) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x553300, 0x0) (rerun: 32) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2000002, 0x30, r0, 0x0) (async) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000080), 0x80600, 0x0) io_uring_register$IORING_REGISTER_PROBE(r1, 0x8, &(0x7f00000000c0)={0x0, 0x0, 0x0, '\x00', [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, 0x14) (async) write$P9_RXATTRCREATE(r0, &(0x7f0000000000)={0x7, 0x21, 0x2}, 0x7) (async) fsopen(&(0x7f0000000040)='overlay\x00', 0x1) 14:44:46 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x58040, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(r1, 0x7, &(0x7f0000000040)=r0, 0x1) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) 14:44:46 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}}, 0x120) 14:44:46 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) exit_group(0x8d14) exit_group(0x1ff) [ 3593.834510][ T5158] vfs_write+0x7f5/0x950 [ 3593.838757][ T5158] ksys_write+0xd9/0x190 [ 3593.843011][ T5158] __x64_sys_write+0x3e/0x50 [ 3593.847639][ T5158] do_syscall_64+0x44/0xd0 [ 3593.852086][ T5158] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3593.858051][ T5158] RIP: 0033:0x7f9e8db3d059 [ 3593.862474][ T5158] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 3593.882087][ T5158] RSP: 002b:00007f9e8ccb3168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3593.890556][ T5158] RAX: ffffffffffffffda RBX: 00007f9e8dc4ff60 RCX: 00007f9e8db3d059 [ 3593.898531][ T5158] RDX: 0000000020000260 RSI: 0000000020000140 RDI: 0000000000000003 [ 3593.906507][ T5158] RBP: 00007f9e8ccb31d0 R08: 0000000000000000 R09: 0000000000000000 [ 3593.914557][ T5158] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3593.922530][ T5158] R13: 00007ffe952cf46f R14: 00007f9e8ccb3300 R15: 0000000000022000 [ 3593.930508][ T5158] 14:44:47 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "13bd94e32c37a3932d8ad7271907f2903ccf3bb13b387d8fdf025cdf3c8faa37a970ea456fa2fd6f8354fc3b05088269a6d5b022e392b9bd78e5e2308e054c3e2cbb6e61b42c74f3c1ba8d63d10ed85dcc5d58071547cdfd9661f05024bcf8d7722e987a76fced66d3b33373d61da648b231fe3de6f7dc9a78420b7bf0a04efb660e06f2bf671a2060d09d80f7ee6ba3ae0b6edf87d14be34012ef95719e01f065ec7943a48dcce0fcf8f7f3a89c24d940f201c7c73a3c97872a80ca25d1a3114fe16f225f4f55f3c6456cab8f0aa59d8efdc6939eb7f2b223ceff25db5222ff8e86c024229beec9ce765151d6e706fd60ab8ffe4c2e736eec4bcae53c1aaaef"}}}, 0x20000260) (fail_nth: 46) 14:44:47 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x8040000, 0x0, "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"}}}, 0x20000260) 14:44:47 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) exit_group(0x8d14) (async) exit_group(0x1ff) 14:44:47 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x58040, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(r1, 0x7, &(0x7f0000000040)=r0, 0x1) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "e0b3772264c43c79ea3709d20d36cc4637f10fb5de2d44e0a73f520c3612063189eaba7b99fa9556bcac2ba1fb34035db66efe1e7ea748d786f601d0dcc0875cb8313c7db8b6c64b414bd5a06373bc3fbdf80ab140bf4b8f6c4a991196664cd95bbff1abeb0e982cc9b17aac4b0381a35d7a53d098e99e432a3b2f69c8b9abd7356e7cc0700ff8a36c56bf3e8a01564cd35c263749dc7c61c59645ecda836dc9f9771ff0fcdeec9e4d22cc1722bacd35e0096e747dac83ef85aed84e433e8b13e27f70ad877ff1a53934e230ed382a6c4ff7a6c1d3bb2cee4b336dcd368e29a06ed88efe1806f129bfbdfccf6c5e3ba935eb8ad0af3928b311e0a1c89eca9c75"}}, 0x110) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) (async) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x58040, 0x0) (async) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(r1, 0x7, &(0x7f0000000040)=r0, 0x1) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) (async) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) (async) 14:44:47 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}}, 0x120) 14:44:47 executing program 5: fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x553300, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2000002, 0x30, r0, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000080), 0x80600, 0x0) io_uring_register$IORING_REGISTER_PROBE(r1, 0x8, &(0x7f00000000c0)={0x0, 0x0, 0x0, '\x00', [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, 0x14) (async) write$P9_RXATTRCREATE(r0, &(0x7f0000000000)={0x7, 0x21, 0x2}, 0x7) (async) fsopen(&(0x7f0000000040)='overlay\x00', 0x1) 14:44:47 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}}}, 0x120) 14:44:47 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x58040, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(r1, 0x7, &(0x7f0000000040)=r0, 0x1) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) (async) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x58040, 0x0) (async) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(r1, 0x7, &(0x7f0000000040)=r0, 0x1) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "e0b3772264c43c79ea3709d20d36cc4637f10fb5de2d44e0a73f520c3612063189eaba7b99fa9556bcac2ba1fb34035db66efe1e7ea748d786f601d0dcc0875cb8313c7db8b6c64b414bd5a06373bc3fbdf80ab140bf4b8f6c4a991196664cd95bbff1abeb0e982cc9b17aac4b0381a35d7a53d098e99e432a3b2f69c8b9abd7356e7cc0700ff8a36c56bf3e8a01564cd35c263749dc7c61c59645ecda836dc9f9771ff0fcdeec9e4d22cc1722bacd35e0096e747dac83ef85aed84e433e8b13e27f70ad877ff1a53934e230ed382a6c4ff7a6c1d3bb2cee4b336dcd368e29a06ed88efe1806f129bfbdfccf6c5e3ba935eb8ad0af3928b311e0a1c89eca9c75"}}, 0x110) (async) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) (async) 14:44:47 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) exit_group(0x8d14) exit_group(0x1ff) openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) (async) exit_group(0x8d14) (async) exit_group(0x1ff) (async) 14:44:47 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) io_setup(0x5b6, &(0x7f0000000000)=0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r3) io_cancel(r1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x7, 0x5, r2, &(0x7f0000000080)="465a57c4aee9f8769b50c86a9bd3407b33f726edde13fe634775811991921c4ebc59c941d16697b0487b5419eda89f690bf87a64ff497ec49a3754805861848438c0a6a6a1ac5d2513711e9ffb415cdcc02f2f87ca05dcb6d26859bee9c035c07616330e", 0x64, 0x7ff, 0x0, 0x3, r3}, &(0x7f0000000280)) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) 14:44:47 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x884c2, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r1) r2 = fsopen(&(0x7f0000000240)='omfs\x00', 0x1) r3 = inotify_init() inotify_rm_watch(r3, 0x0) fsconfig$FSCONFIG_SET_FD(r2, 0x5, &(0x7f0000000300)='/dev/bsg\x00', 0x0, r3) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000200)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000000)=[{0x3, 0x0, [0x100, 0x0, 0x6f, 0x2, 0x0, 0x3, 0x0, 0x3, 0x1, 0x400000, 0x100, 0x0, 0x6, 0x5, 0x4, 0x9]}, {0x2, 0x0, [0x1, 0x2c, 0x2, 0x1, 0x7, 0xffffffff, 0x2, 0x6, 0x7236, 0x0, 0x1ff, 0xffff, 0x8, 0x8, 0x1, 0xb95]}, {0x5a, 0x0, [0x9, 0x5, 0x81, 0x9, 0x800, 0x100, 0x40, 0xd2ca, 0xffffff81, 0x5, 0x5, 0xfff, 0x4, 0xffffffff, 0x401, 0x2]}, {0x4, 0x0, [0x7, 0x80, 0x223, 0x6, 0x6, 0x3f, 0x8b9a, 0x3ff, 0x6, 0x1b32dbfc, 0x8, 0x1, 0x3, 0x237, 0xd6e, 0x310]}, {0x25, 0x0, [0x7fffffff, 0x10, 0x1000, 0x9, 0x5, 0x1ff, 0x1, 0x3, 0x5, 0xffffffff, 0x4, 0x4, 0x4, 0x5, 0xb4, 0x200]}], r4, 0x1, 0x1, 0x168}}, 0x20) r5 = syz_io_uring_setup(0x4180, &(0x7f0000000340)={0x0, 0xee9d, 0x0, 0x3, 0x93}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000003c0), &(0x7f0000000400)) r6 = eventfd2(0x2, 0x180001) io_uring_register$IORING_REGISTER_FILES_UPDATE(r5, 0x6, &(0x7f0000000480)={0x40, 0x0, &(0x7f0000000440)=[r1, r6, 0xffffffffffffffff, r0, r2]}, 0x5) [ 3594.065466][ T5196] FAULT_INJECTION: forcing a failure. [ 3594.065466][ T5196] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3594.078774][ T5196] CPU: 1 PID: 5196 Comm: syz-executor.0 Not tainted 5.17.0-rc2-syzkaller-00167-gdcb85f85fa6f-dirty #0 [ 3594.089719][ T5196] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3594.099786][ T5196] Call Trace: [ 3594.103086][ T5196] [ 3594.106018][ T5196] dump_stack_lvl+0xd6/0x122 [ 3594.110636][ T5196] dump_stack+0x11/0x1b 14:44:47 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) (async) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x884c2, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r1) r2 = fsopen(&(0x7f0000000240)='omfs\x00', 0x1) (async) r3 = inotify_init() inotify_rm_watch(r3, 0x0) (async) fsconfig$FSCONFIG_SET_FD(r2, 0x5, &(0x7f0000000300)='/dev/bsg\x00', 0x0, r3) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000200)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000000)=[{0x3, 0x0, [0x100, 0x0, 0x6f, 0x2, 0x0, 0x3, 0x0, 0x3, 0x1, 0x400000, 0x100, 0x0, 0x6, 0x5, 0x4, 0x9]}, {0x2, 0x0, [0x1, 0x2c, 0x2, 0x1, 0x7, 0xffffffff, 0x2, 0x6, 0x7236, 0x0, 0x1ff, 0xffff, 0x8, 0x8, 0x1, 0xb95]}, {0x5a, 0x0, [0x9, 0x5, 0x81, 0x9, 0x800, 0x100, 0x40, 0xd2ca, 0xffffff81, 0x5, 0x5, 0xfff, 0x4, 0xffffffff, 0x401, 0x2]}, {0x4, 0x0, [0x7, 0x80, 0x223, 0x6, 0x6, 0x3f, 0x8b9a, 0x3ff, 0x6, 0x1b32dbfc, 0x8, 0x1, 0x3, 0x237, 0xd6e, 0x310]}, {0x25, 0x0, [0x7fffffff, 0x10, 0x1000, 0x9, 0x5, 0x1ff, 0x1, 0x3, 0x5, 0xffffffff, 0x4, 0x4, 0x4, 0x5, 0xb4, 0x200]}], r4, 0x1, 0x1, 0x168}}, 0x20) (async) r5 = syz_io_uring_setup(0x4180, &(0x7f0000000340)={0x0, 0xee9d, 0x0, 0x3, 0x93}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000003c0), &(0x7f0000000400)) (async) r6 = eventfd2(0x2, 0x180001) io_uring_register$IORING_REGISTER_FILES_UPDATE(r5, 0x6, &(0x7f0000000480)={0x40, 0x0, &(0x7f0000000440)=[r1, r6, 0xffffffffffffffff, r0, r2]}, 0x5) [ 3594.114832][ T5196] should_fail+0x23c/0x250 [ 3594.119255][ T5196] __alloc_pages+0x102/0x330 [ 3594.123854][ T5196] alloc_pages_vma+0x67e/0x810 [ 3594.128695][ T5196] ? percpu_counter_add_batch+0x109/0x130 [ 3594.134476][ T5196] shmem_getpage_gfp+0x8b4/0x12c0 [ 3594.139550][ T5196] ? do_user_addr_fault+0x7d4/0xb90 [ 3594.149403][ T5196] shmem_write_begin+0x7e/0x100 [ 3594.154301][ T5196] generic_perform_write+0x1c8/0x400 [ 3594.159611][ T5196] ? shmem_write_begin+0x100/0x100 [ 3594.164725][ T5196] __generic_file_write_iter+0xf7/0x2b0 [ 3594.170361][ T5196] ? generic_write_checks+0x242/0x290 [ 3594.175757][ T5196] generic_file_write_iter+0x75/0x130 [ 3594.181148][ T5196] vfs_write+0x7f5/0x950 [ 3594.185403][ T5196] ksys_write+0xd9/0x190 [ 3594.189670][ T5196] __x64_sys_write+0x3e/0x50 [ 3594.194261][ T5196] do_syscall_64+0x44/0xd0 [ 3594.198680][ T5196] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3594.204574][ T5196] RIP: 0033:0x7f9e8db3d059 [ 3594.209085][ T5196] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 3594.228697][ T5196] RSP: 002b:00007f9e8ccb3168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3594.237108][ T5196] RAX: ffffffffffffffda RBX: 00007f9e8dc4ff60 RCX: 00007f9e8db3d059 [ 3594.245082][ T5196] RDX: 0000000020000260 RSI: 0000000020000140 RDI: 0000000000000003 [ 3594.253052][ T5196] RBP: 00007f9e8ccb31d0 R08: 0000000000000000 R09: 0000000000000000 14:44:47 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "13bd94e32c37a3932d8ad7271907f2903ccf3bb13b387d8fdf025cdf3c8faa37a970ea456fa2fd6f8354fc3b05088269a6d5b022e392b9bd78e5e2308e054c3e2cbb6e61b42c74f3c1ba8d63d10ed85dcc5d58071547cdfd9661f05024bcf8d7722e987a76fced66d3b33373d61da648b231fe3de6f7dc9a78420b7bf0a04efb660e06f2bf671a2060d09d80f7ee6ba3ae0b6edf87d14be34012ef95719e01f065ec7943a48dcce0fcf8f7f3a89c24d940f201c7c73a3c97872a80ca25d1a3114fe16f225f4f55f3c6456cab8f0aa59d8efdc6939eb7f2b223ceff25db5222ff8e86c024229beec9ce765151d6e706fd60ab8ffe4c2e736eec4bcae53c1aaaef"}}}, 0x20000260) (fail_nth: 47) 14:44:47 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000100), 0x77fac0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000000c0), 0x800, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040), 0x0, 0x2}}, 0x20) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r2) io_uring_enter(r2, 0x7598, 0xd712, 0x2, &(0x7f0000000140)={[0x7f]}, 0x8) io_uring_register$IORING_UNREGISTER_BUFFERS(r0, 0x1, 0x0, 0x0) 14:44:47 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) (async) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x884c2, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r1) (async) r2 = fsopen(&(0x7f0000000240)='omfs\x00', 0x1) r3 = inotify_init() inotify_rm_watch(r3, 0x0) (async) fsconfig$FSCONFIG_SET_FD(r2, 0x5, &(0x7f0000000300)='/dev/bsg\x00', 0x0, r3) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000200)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000000)=[{0x3, 0x0, [0x100, 0x0, 0x6f, 0x2, 0x0, 0x3, 0x0, 0x3, 0x1, 0x400000, 0x100, 0x0, 0x6, 0x5, 0x4, 0x9]}, {0x2, 0x0, [0x1, 0x2c, 0x2, 0x1, 0x7, 0xffffffff, 0x2, 0x6, 0x7236, 0x0, 0x1ff, 0xffff, 0x8, 0x8, 0x1, 0xb95]}, {0x5a, 0x0, [0x9, 0x5, 0x81, 0x9, 0x800, 0x100, 0x40, 0xd2ca, 0xffffff81, 0x5, 0x5, 0xfff, 0x4, 0xffffffff, 0x401, 0x2]}, {0x4, 0x0, [0x7, 0x80, 0x223, 0x6, 0x6, 0x3f, 0x8b9a, 0x3ff, 0x6, 0x1b32dbfc, 0x8, 0x1, 0x3, 0x237, 0xd6e, 0x310]}, {0x25, 0x0, [0x7fffffff, 0x10, 0x1000, 0x9, 0x5, 0x1ff, 0x1, 0x3, 0x5, 0xffffffff, 0x4, 0x4, 0x4, 0x5, 0xb4, 0x200]}], r4, 0x1, 0x1, 0x168}}, 0x20) (async) r5 = syz_io_uring_setup(0x4180, &(0x7f0000000340)={0x0, 0xee9d, 0x0, 0x3, 0x93}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000003c0), &(0x7f0000000400)) (async) r6 = eventfd2(0x2, 0x180001) io_uring_register$IORING_REGISTER_FILES_UPDATE(r5, 0x6, &(0x7f0000000480)={0x40, 0x0, &(0x7f0000000440)=[r1, r6, 0xffffffffffffffff, r0, r2]}, 0x5) 14:44:47 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "e0b3772264c43c79ea3709d20d36cc4637f10fb5de2d44e0a73f520c3612063189eaba7b99fa9556bcac2ba1fb34035db66efe1e7ea748d786f601d0dcc0875cb8313c7db8b6c64b414bd5a06373bc3fbdf80ab140bf4b8f6c4a991196664cd95bbff1abeb0e982cc9b17aac4b0381a35d7a53d098e99e432a3b2f69c8b9abd7356e7cc0700ff8a36c56bf3e8a01564cd35c263749dc7c61c59645ecda836dc9f9771ff0fcdeec9e4d22cc1722bacd35e0096e747dac83ef85aed84e433e8b13e27f70ad877ff1a53934e230ed382a6c4ff7a6c1d3bb2cee4b336dcd368e29a06ed88efe1806f129bfbdfccf6c5e3ba935eb8ad0af3928b311e0a1c89eca9c75"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}, 0x120) 14:44:47 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x8800000, 0x0, "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"}}}, 0x20000260) [ 3594.261025][ T5196] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3594.269096][ T5196] R13: 00007ffe952cf46f R14: 00007f9e8ccb3300 R15: 0000000000022000 [ 3594.277070][ T5196] [ 3594.296290][ T5218] FAULT_INJECTION: forcing a failure. [ 3594.296290][ T5218] name fail_usercopy, interval 1, probability 0, space 0, times 0 14:44:47 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}}}, 0x120) 14:44:47 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000100), 0x77fac0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000000c0), 0x800, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040), 0x0, 0x2}}, 0x20) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r2) (async) io_uring_enter(r2, 0x7598, 0xd712, 0x2, &(0x7f0000000140)={[0x7f]}, 0x8) (async) io_uring_register$IORING_UNREGISTER_BUFFERS(r0, 0x1, 0x0, 0x0) 14:44:47 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r0, 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICLIST(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="e8000000a654bbe8462495f5ee728270564bad3d60d8407aaaaf25722d7f1bebf08cf9ed797cd8bcbc60161f9197c078b9d791077d00ce8a68b0efe7db23d5b60212be4e17b9ee59b638ef961aab7db9912bb2da66a4333e778738f753cd39b43d1f06efabf20e7573379c609a0f17fd0f8c2523b01720fe7d348d041885db59040ad4ab51aa3e", @ANYRES16=0x0, @ANYBLOB="000126bd7000ffdbdf25050000002100070073797374654e5f753a6f626a6563745f723a746d7066735f743a73300000000014000300000000000000000000000000000000000500010001000000140006006261746164763000000000000000000014000600776c616e3100000000000000000000002700070073797374656d5f753a6f626a6563745f723a666f6e74735f63616368655f743a733000002600070073797374656d5f753a6f626a6563745f723a73797374656d5f6d61705f743a733000000014000200fe8000000000000000000000000000aa08000400ac14142f"], 0xe8}, 0x1, 0x0, 0x0, 0x4080}, 0x20040010) openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) 14:44:47 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r0, 0x0, 0x0) (async) sendmsg$NLBL_UNLABEL_C_STATICLIST(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="e8000000a654bbe8462495f5ee728270564bad3d60d8407aaaaf25722d7f1bebf08cf9ed797cd8bcbc60161f9197c078b9d791077d00ce8a68b0efe7db23d5b60212be4e17b9ee59b638ef961aab7db9912bb2da66a4333e778738f753cd39b43d1f06efabf20e7573379c609a0f17fd0f8c2523b01720fe7d348d041885db59040ad4ab51aa3e", @ANYRES16=0x0, @ANYBLOB="000126bd7000ffdbdf25050000002100070073797374654e5f753a6f626a6563745f723a746d7066735f743a73300000000014000300000000000000000000000000000000000500010001000000140006006261746164763000000000000000000014000600776c616e3100000000000000000000002700070073797374656d5f753a6f626a6563745f723a666f6e74735f63616368655f743a733000002600070073797374656d5f753a6f626a6563745f723a73797374656d5f6d61705f743a733000000014000200fe8000000000000000000000000000aa08000400ac14142f"], 0xe8}, 0x1, 0x0, 0x0, 0x4080}, 0x20040010) (async) openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) [ 3594.309642][ T5218] CPU: 1 PID: 5218 Comm: syz-executor.0 Not tainted 5.17.0-rc2-syzkaller-00167-gdcb85f85fa6f-dirty #0 [ 3594.320711][ T5218] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3594.330778][ T5218] Call Trace: [ 3594.334058][ T5218] [ 3594.336989][ T5218] dump_stack_lvl+0xd6/0x122 [ 3594.341601][ T5218] dump_stack+0x11/0x1b [ 3594.345781][ T5218] should_fail+0x23c/0x250 [ 3594.350246][ T5218] should_fail_usercopy+0x16/0x20 [ 3594.355339][ T5218] copy_page_from_iter_atomic+0x2f1/0xcd0 [ 3594.361156][ T5218] ? shmem_write_begin+0x7e/0x100 [ 3594.366191][ T5218] generic_perform_write+0x211/0x400 [ 3594.371505][ T5218] ? shmem_write_begin+0x100/0x100 [ 3594.376725][ T5218] __generic_file_write_iter+0xf7/0x2b0 [ 3594.382288][ T5218] ? generic_write_checks+0x242/0x290 [ 3594.387744][ T5218] generic_file_write_iter+0x75/0x130 [ 3594.393228][ T5218] vfs_write+0x7f5/0x950 [ 3594.397476][ T5218] ksys_write+0xd9/0x190 [ 3594.401723][ T5218] __x64_sys_write+0x3e/0x50 [ 3594.406317][ T5218] do_syscall_64+0x44/0xd0 [ 3594.410819][ T5218] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3594.416724][ T5218] RIP: 0033:0x7f9e8db3d059 [ 3594.421136][ T5218] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 3594.440748][ T5218] RSP: 002b:00007f9e8ccb3168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3594.449275][ T5218] RAX: ffffffffffffffda RBX: 00007f9e8dc4ff60 RCX: 00007f9e8db3d059 [ 3594.457240][ T5218] RDX: 0000000020000260 RSI: 0000000020000140 RDI: 0000000000000003 14:44:47 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) (async) io_setup(0x5b6, &(0x7f0000000000)=0x0) (async) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r3) io_cancel(r1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x7, 0x5, r2, &(0x7f0000000080)="465a57c4aee9f8769b50c86a9bd3407b33f726edde13fe634775811991921c4ebc59c941d16697b0487b5419eda89f690bf87a64ff497ec49a3754805861848438c0a6a6a1ac5d2513711e9ffb415cdcc02f2f87ca05dcb6d26859bee9c035c07616330e", 0x64, 0x7ff, 0x0, 0x3, r3}, &(0x7f0000000280)) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) (async) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) 14:44:47 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r0, 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICLIST(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="e8000000a654bbe8462495f5ee728270564bad3d60d8407aaaaf25722d7f1bebf08cf9ed797cd8bcbc60161f9197c078b9d791077d00ce8a68b0efe7db23d5b60212be4e17b9ee59b638ef961aab7db9912bb2da66a4333e778738f753cd39b43d1f06efabf20e7573379c609a0f17fd0f8c2523b01720fe7d348d041885db59040ad4ab51aa3e", @ANYRES16=0x0, @ANYBLOB="000126bd7000ffdbdf25050000002100070073797374654e5f753a6f626a6563745f723a746d7066735f743a73300000000014000300000000000000000000000000000000000500010001000000140006006261746164763000000000000000000014000600776c616e3100000000000000000000002700070073797374656d5f753a6f626a6563745f723a666f6e74735f63616368655f743a733000002600070073797374656d5f753a6f626a6563745f723a73797374656d5f6d61705f743a733000000014000200fe8000000000000000000000000000aa08000400ac14142f"], 0xe8}, 0x1, 0x0, 0x0, 0x4080}, 0x20040010) openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) sendmsg$NLBL_UNLABEL_C_STATICADD(r0, 0x0, 0x0) (async) sendmsg$NLBL_UNLABEL_C_STATICLIST(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="e8000000a654bbe8462495f5ee728270564bad3d60d8407aaaaf25722d7f1bebf08cf9ed797cd8bcbc60161f9197c078b9d791077d00ce8a68b0efe7db23d5b60212be4e17b9ee59b638ef961aab7db9912bb2da66a4333e778738f753cd39b43d1f06efabf20e7573379c609a0f17fd0f8c2523b01720fe7d348d041885db59040ad4ab51aa3e", @ANYRES16=0x0, @ANYBLOB="000126bd7000ffdbdf25050000002100070073797374654e5f753a6f626a6563745f723a746d7066735f743a73300000000014000300000000000000000000000000000000000500010001000000140006006261746164763000000000000000000014000600776c616e3100000000000000000000002700070073797374656d5f753a6f626a6563745f723a666f6e74735f63616368655f743a733000002600070073797374656d5f753a6f626a6563745f723a73797374656d5f6d61705f743a733000000014000200fe8000000000000000000000000000aa08000400ac14142f"], 0xe8}, 0x1, 0x0, 0x0, 0x4080}, 0x20040010) (async) openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) (async) 14:44:47 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) [ 3594.465259][ T5218] RBP: 00007f9e8ccb31d0 R08: 0000000000000000 R09: 0000000000000000 [ 3594.473230][ T5218] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3594.481242][ T5218] R13: 00007ffe952cf46f R14: 00007f9e8ccb3300 R15: 0000000000022000 [ 3594.489352][ T5218] 14:44:47 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x20000260) (fail_nth: 48) 14:44:47 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000100), 0x77fac0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000000c0), 0x800, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040), 0x0, 0x2}}, 0x20) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r2) (async) io_uring_enter(r2, 0x7598, 0xd712, 0x2, &(0x7f0000000140)={[0x7f]}, 0x8) (async) io_uring_register$IORING_UNREGISTER_BUFFERS(r0, 0x1, 0x0, 0x0) 14:44:47 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0xc000000, 0x0, "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"}}}, 0x20000260) 14:44:47 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000000)=0x7, 0x4) 14:44:47 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "e0b3772264c43c79ea3709d20d36cc4637f10fb5de2d44e0a73f520c3612063189eaba7b99fa9556bcac2ba1fb34035db66efe1e7ea748d786f601d0dcc0875cb8313c7db8b6c64b414bd5a06373bc3fbdf80ab140bf4b8f6c4a991196664cd95bbff1abeb0e982cc9b17aac4b0381a35d7a53d098e99e432a3b2f69c8b9abd7356e7cc0700ff8a36c56bf3e8a01564cd35c263749dc7c61c59645ecda836dc9f9771ff0fcdeec9e4d22cc1722bacd35e0096e747dac83ef85aed84e433e8b13e27f70ad877ff1a53934e230ed382a6c4ff7a6c1d3bb2cee4b336dcd368e29a06ed88efe1806f129bfbdfccf6c5e3ba935eb8ad0af3928b311e0a1c89eca9c75"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "13bd94e32c37a3932d8ad7271907f2903ccf3bb13b387d8fdf025cdf3c8faa37a970ea456fa2fd6f8354fc3b05088269a6d5b022e392b9bd78e5e2308e054c3e2cbb6e61b42c74f3c1ba8d63d10ed85dcc5d58071547cdfd9661f05024bcf8d7722e987a76fced66d3b33373d61da648b231fe3de6f7dc9a78420b7bf0a04efb660e06f2bf671a2060d09d80f7ee6ba3ae0b6edf87d14be34012ef95719e01f065ec7943a48dcce0fcf8f7f3a89c24d940f201c7c73a3c97872a80ca25d1a3114fe16f225f4f55f3c6456cab8f0aa59d8efdc6939eb7f2b223ceff25db5222ff8e86c024229beec9ce765151d6e706fd60ab8ffe4c2e736eec4bcae53c1aaaef"}, 0xffffffffffffffff, 0x2}}, 0x120) 14:44:47 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x9, 0x22810, r0, 0x10000000) 14:44:47 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "e0b3772264c43c79ea3709d20d36cc4637f10fb5de2d44e0a73f520c3612063189eaba7b99fa9556bcac2ba1fb34035db66efe1e7ea748d786f601d0dcc0875cb8313c7db8b6c64b414bd5a06373bc3fbdf80ab140bf4b8f6c4a991196664cd95bbff1abeb0e982cc9b17aac4b0381a35d7a53d098e99e432a3b2f69c8b9abd7356e7cc0700ff8a36c56bf3e8a01564cd35c263749dc7c61c59645ecda836dc9f9771ff0fcdeec9e4d22cc1722bacd35e0096e747dac83ef85aed84e433e8b13e27f70ad877ff1a53934e230ed382a6c4ff7a6c1d3bb2cee4b336dcd368e29a06ed88efe1806f129bfbdfccf6c5e3ba935eb8ad0af3928b311e0a1c89eca9c75"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}, 0xffffffffffffffff, 0x3}}, 0x120) 14:44:47 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) io_setup(0x5b6, &(0x7f0000000000)=0x0) (async) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r3) (async) io_cancel(r1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x7, 0x5, r2, &(0x7f0000000080)="465a57c4aee9f8769b50c86a9bd3407b33f726edde13fe634775811991921c4ebc59c941d16697b0487b5419eda89f690bf87a64ff497ec49a3754805861848438c0a6a6a1ac5d2513711e9ffb415cdcc02f2f87ca05dcb6d26859bee9c035c07616330e", 0x64, 0x7ff, 0x0, 0x3, r3}, &(0x7f0000000280)) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) [ 3594.624894][ T5263] FAULT_INJECTION: forcing a failure. [ 3594.624894][ T5263] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3594.638191][ T5263] CPU: 1 PID: 5263 Comm: syz-executor.0 Not tainted 5.17.0-rc2-syzkaller-00167-gdcb85f85fa6f-dirty #0 [ 3594.649126][ T5263] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3594.659184][ T5263] Call Trace: [ 3594.662462][ T5263] [ 3594.665393][ T5263] dump_stack_lvl+0xd6/0x122 [ 3594.669997][ T5263] dump_stack+0x11/0x1b 14:44:47 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}, 0xffffffffffffffff, 0x4}}, 0x120) 14:44:47 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}, 0xffffffffffffffff, 0x5}}, 0x120) [ 3594.674292][ T5263] should_fail+0x23c/0x250 [ 3594.678713][ T5263] __alloc_pages+0x102/0x330 [ 3594.683306][ T5263] alloc_pages_vma+0x67e/0x810 [ 3594.688077][ T5263] ? percpu_counter_add_batch+0x109/0x130 [ 3594.693802][ T5263] shmem_getpage_gfp+0x8b4/0x12c0 [ 3594.698881][ T5263] ? do_user_addr_fault+0x7d4/0xb90 [ 3594.704190][ T5263] shmem_write_begin+0x7e/0x100 [ 3594.709048][ T5263] generic_perform_write+0x1c8/0x400 [ 3594.714340][ T5263] ? shmem_write_begin+0x100/0x100 [ 3594.719459][ T5263] __generic_file_write_iter+0xf7/0x2b0 14:44:47 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}, 0xffffffffffffffff, 0x8}}, 0x120) 14:44:47 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "e0b3772264c43c79ea3709d20d36cc4637f10fb5de2d44e0a73f520c3612063189eaba7b99fa9556bcac2ba1fb34035db66efe1e7ea748d786f601d0dcc0875cb8313c7db8b6c64b414bd5a06373bc3fbdf80ab140bf4b8f6c4a991196664cd95bbff1abeb0e982cc9b17aac4b0381a35d7a53d098e99e432a3b2f69c8b9abd7356e7cc0700ff8a36c56bf3e8a01564cd35c263749dc7c61c59645ecda836dc9f9771ff0fcdeec9e4d22cc1722bacd35e0096e747dac83ef85aed84e433e8b13e27f70ad877ff1a53934e230ed382a6c4ff7a6c1d3bb2cee4b336dcd368e29a06ed88efe1806f129bfbdfccf6c5e3ba935eb8ad0af3928b311e0a1c89eca9c75"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}, 0xffffffffffffffff, 0x300}}, 0x120) [ 3594.725022][ T5263] ? generic_write_checks+0x242/0x290 [ 3594.730510][ T5263] generic_file_write_iter+0x75/0x130 [ 3594.735881][ T5263] vfs_write+0x7f5/0x950 [ 3594.740134][ T5263] ksys_write+0xd9/0x190 [ 3594.744374][ T5263] __x64_sys_write+0x3e/0x50 [ 3594.748966][ T5263] do_syscall_64+0x44/0xd0 [ 3594.753403][ T5263] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3594.759301][ T5263] RIP: 0033:0x7f9e8db3d059 [ 3594.763714][ T5263] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 3594.783327][ T5263] RSP: 002b:00007f9e8ccb3168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3594.791747][ T5263] RAX: ffffffffffffffda RBX: 00007f9e8dc4ff60 RCX: 00007f9e8db3d059 [ 3594.799720][ T5263] RDX: 0000000020000260 RSI: 0000000020000140 RDI: 0000000000000003 [ 3594.807751][ T5263] RBP: 00007f9e8ccb31d0 R08: 0000000000000000 R09: 0000000000000000 [ 3594.815717][ T5263] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 14:44:47 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "13bd94e32c37a3932d8ad7271907f2903ccf3bb13b387d8fdf025cdf3c8faa37a970ea456fa2fd6f8354fc3b05088269a6d5b022e392b9bd78e5e2308e054c3e2cbb6e61b42c74f3c1ba8d63d10ed85dcc5d58071547cdfd9661f05024bcf8d7722e987a76fced66d3b33373d61da648b231fe3de6f7dc9a78420b7bf0a04efb660e06f2bf671a2060d09d80f7ee6ba3ae0b6edf87d14be34012ef95719e01f065ec7943a48dcce0fcf8f7f3a89c24d940f201c7c73a3c97872a80ca25d1a3114fe16f225f4f55f3c6456cab8f0aa59d8efdc6939eb7f2b223ceff25db5222ff8e86c024229beec9ce765151d6e706fd60ab8ffe4c2e736eec4bcae53c1aaaef"}}}, 0x20000260) (fail_nth: 49) 14:44:47 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) (async) r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000000)=0x7, 0x4) 14:44:47 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}, 0xffffffffffffffff, 0x500}}, 0x120) 14:44:47 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x10000000, 0x0, "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"}}}, 0x20000260) 14:44:47 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0x0) (async) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x9, 0x22810, r0, 0x10000000) [ 3594.823695][ T5263] R13: 00007ffe952cf46f R14: 00007f9e8ccb3300 R15: 0000000000022000 [ 3594.831673][ T5263] 14:44:48 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000000)=0x7, 0x4) openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) (async) socket$inet_sctp(0x2, 0x1, 0x84) (async) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000000)=0x7, 0x4) (async) 14:44:48 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "e0b3772264c43c79ea3709d20d36cc4637f10fb5de2d44e0a73f520c3612063189eaba7b99fa9556bcac2ba1fb34035db66efe1e7ea748d786f601d0dcc0875cb8313c7db8b6c64b414bd5a06373bc3fbdf80ab140bf4b8f6c4a991196664cd95bbff1abeb0e982cc9b17aac4b0381a35d7a53d098e99e432a3b2f69c8b9abd7356e7cc0700ff8a36c56bf3e8a01564cd35c263749dc7c61c59645ecda836dc9f9771ff0fcdeec9e4d22cc1722bacd35e0096e747dac83ef85aed84e433e8b13e27f70ad877ff1a53934e230ed382a6c4ff7a6c1d3bb2cee4b336dcd368e29a06ed88efe1806f129bfbdfccf6c5e3ba935eb8ad0af3928b311e0a1c89eca9c75"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "13bd94e32c37a3932d8ad7271907f2903ccf3bb13b387d8fdf025cdf3c8faa37a970ea456fa2fd6f8354fc3b05088269a6d5b022e392b9bd78e5e2308e054c3e2cbb6e61b42c74f3c1ba8d63d10ed85dcc5d58071547cdfd9661f05024bcf8d7722e987a76fced66d3b33373d61da648b231fe3de6f7dc9a78420b7bf0a04efb660e06f2bf671a2060d09d80f7ee6ba3ae0b6edf87d14be34012ef95719e01f065ec7943a48dcce0fcf8f7f3a89c24d940f201c7c73a3c97872a80ca25d1a3114fe16f225f4f55f3c6456cab8f0aa59d8efdc6939eb7f2b223ceff25db5222ff8e86c024229beec9ce765151d6e706fd60ab8ffe4c2e736eec4bcae53c1aaaef"}, 0xffffffffffffffff, 0x1000000}}, 0x120) 14:44:48 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}, 0xffffffffffffffff, 0x2000000}}, 0x120) [ 3594.872679][ T5293] FAULT_INJECTION: forcing a failure. [ 3594.872679][ T5293] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3594.885755][ T5293] CPU: 1 PID: 5293 Comm: syz-executor.0 Not tainted 5.17.0-rc2-syzkaller-00167-gdcb85f85fa6f-dirty #0 [ 3594.896700][ T5293] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3594.906758][ T5293] Call Trace: [ 3594.910053][ T5293] [ 3594.913059][ T5293] dump_stack_lvl+0xd6/0x122 [ 3594.917719][ T5293] dump_stack+0x11/0x1b [ 3594.921882][ T5293] should_fail+0x23c/0x250 [ 3594.926301][ T5293] should_fail_usercopy+0x16/0x20 [ 3594.931332][ T5293] copy_page_from_iter_atomic+0x2f1/0xcd0 [ 3594.937103][ T5293] ? shmem_write_begin+0x7e/0x100 [ 3594.942202][ T5293] generic_perform_write+0x211/0x400 [ 3594.947494][ T5293] ? shmem_write_begin+0x100/0x100 [ 3594.952617][ T5293] __generic_file_write_iter+0xf7/0x2b0 [ 3594.958169][ T5293] ? generic_write_checks+0x242/0x290 [ 3594.963575][ T5293] generic_file_write_iter+0x75/0x130 [ 3594.968963][ T5293] vfs_write+0x7f5/0x950 [ 3594.973214][ T5293] ksys_write+0xd9/0x190 [ 3594.977555][ T5293] __x64_sys_write+0x3e/0x50 [ 3594.982153][ T5293] do_syscall_64+0x44/0xd0 [ 3594.986571][ T5293] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3594.992478][ T5293] RIP: 0033:0x7f9e8db3d059 [ 3594.996892][ T5293] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 14:44:48 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x101900, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r1, &(0x7f0000000400)={0xd, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f0000000040)={0x12, 0x10, 0xfa00, {&(0x7f0000000000), 0xffffffffffffffff, r0}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e20, 0x40, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x7}, {0xa, 0x4e22, 0x0, @private2, 0x4}, 0xffffffffffffffff, 0x7fffffff}}, 0x48) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.net/syz0\x00', 0x200002, 0x0) r4 = getegid() ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r2, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r3, {0xffffffffffffffff, r4}}, './file0\x00'}) r5 = inotify_init() inotify_rm_watch(r5, 0x0) inotify_rm_watch(r5, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "13bd94e32c37a3932d8ad7271907f2903ccf3bb13b387d8fdf025cdf3c8faa37a970ea456fa2fd6f8354fc3b05088269a6d5b022e392b9bd78e5e2308e054c3e2cbb6e61b42c74f3c1ba8d63d10ed85dcc5d58071547cdfd9661f05024bcf8d7722e987a76fced66d3b33373d61da648b231fe3de6f7dc9a78420b7bf0a04efb660e06f2bf671a2060d09d80f7ee6ba3ae0b6edf87d14be34012ef95719e01f065ec7943a48dcce0fcf8f7f3a89c24d940f201c7c73a3c97872a80ca25d1a3114fe16f225f4f55f3c6456cab8f0aa59d8efdc6939eb7f2b223ceff25db5222ff8e86c024229beec9ce765151d6e706fd60ab8ffe4c2e736eec4bcae53c1aaaef"}}}, 0x120) inotify_rm_watch(r2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000280)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000500)={0x9, 0x108, 0xfa00, {r6, 0x1, "c578e9", "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"}}, 0x110) 14:44:48 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0x0) (async) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x9, 0x22810, r0, 0x10000000) 14:44:48 executing program 4: r0 = fsmount(0xffffffffffffffff, 0x1, 0xb) write$selinux_attr(r0, &(0x7f0000000080)='system_u:object_r:systemd_logind_exec_t:s0\x00', 0x2b) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) write$selinux_attr(r0, &(0x7f00000006c0)='system_u:object_r:kmsg_device_t:s0\x00', 0x23) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r2) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r3) fsconfig$FSCONFIG_SET_PATH_EMPTY(r2, 0x4, &(0x7f0000000740)='syz0\x00', &(0x7f0000000780)='./file0\x00', r3) ioctl$IMSETDEVNAME(r0, 0x80184947, &(0x7f0000000700)={0x0, 'syz0\x00'}) sendmsg$DEVLINK_CMD_SB_PORT_POOL_SET(r0, &(0x7f0000000340)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB="44020000", @ANYRES16=r1, @ANYBLOB="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"], 0x244}, 0x1, 0x0, 0x0, 0x40000}, 0x10) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r4) io_submit(0x0, 0x2, &(0x7f0000000680)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x5, 0x3, r0, &(0x7f00000000c0)="97fa1c993576db7aa5dd6b2c22b8ab57dab10c928827662cbced1b0ab7c80a013dbf68a19be53b3caaf5db50f4563fa1c9f0bca7ef2850f1f81bcfb530d21da5d01e72254ee5c3360ecbc7c1ebfe25dbcb9b66ff7590957ef4a589d461aa63fb5b043ddf3ba8937800e4f2df4458a460513844457d37286a7ba03950aa11e0960f20a65155ff0c8eaaff429de4c90e8b43159618003087bd592b7817b3333a24482fb6127a3d4a782512fabf1e663c26842e134e19941c22ed648b68d1aada616e400858669f53bd9cbe722a55b51595ae5e13788aca774665c59807ed9d1006b8f702f9", 0xe4, 0x9879, 0x0, 0x3, r4}, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x3, 0x6, r0, &(0x7f0000000200)="a82f7bb10e75fa1d2e4be27f5d280c7200754a10a7593763938ff9dc25968ad92870806d15fb548272dbf10f81e3c2a69ad0ef7500846ddd4e0fdd268077d8e6217d9e42e20360f41f05c73c91e26d2052bcae71d1076d0eb029c124bdbc960306dcfd0769d629216dd37fb6591cb72228777a3b212e6368882f8d7db85b06b95aeb6d3c2546d12b81abacbe4cb1d3a4d544192c99f6ba2b4fb824ab88bdc0555d9c5818bd00603e62ed63ead0aea25ac4f407338b1fad1178a9a4cdbced008d2a534e48ce895c7478cd36d2e40d1e9c5632db24dd9f326dfc3a631f5f8846a4ad03fa8e3d231a7cbf7fa88557bd55a3682402db", 0xf4, 0x8000, 0x0, 0x2}]) openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) 14:44:48 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r1) write$P9_RCREATE(r1, &(0x7f0000000000)={0x18, 0x73, 0x2, {{0x0, 0x4, 0x1}, 0x401}}, 0x18) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r2) fsmount(r2, 0x1, 0x4) mmap$IORING_OFF_SQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0x0) [ 3595.016508][ T5293] RSP: 002b:00007f9e8ccb3168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3595.024932][ T5293] RAX: ffffffffffffffda RBX: 00007f9e8dc4ff60 RCX: 00007f9e8db3d059 [ 3595.032927][ T5293] RDX: 0000000020000260 RSI: 0000000020000140 RDI: 0000000000000003 [ 3595.040901][ T5293] RBP: 00007f9e8ccb31d0 R08: 0000000000000000 R09: 0000000000000000 [ 3595.048935][ T5293] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3595.056905][ T5293] R13: 00007ffe952cf46f R14: 00007f9e8ccb3300 R15: 0000000000022000 [ 3595.064904][ T5293] 14:44:48 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x20000260) (fail_nth: 50) 14:44:48 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x101900, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r1, &(0x7f0000000400)={0xd, 0x10, 0xfa00, {0x0}}, 0x18) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) (async, rerun: 32) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f0000000040)={0x12, 0x10, 0xfa00, {&(0x7f0000000000), 0xffffffffffffffff, r0}}, 0x18) (async, rerun: 32) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e20, 0x40, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x7}, {0xa, 0x4e22, 0x0, @private2, 0x4}, 0xffffffffffffffff, 0x7fffffff}}, 0x48) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.net/syz0\x00', 0x200002, 0x0) r4 = getegid() ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r2, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r3, {0xffffffffffffffff, r4}}, './file0\x00'}) r5 = inotify_init() inotify_rm_watch(r5, 0x0) inotify_rm_watch(r5, 0x0) (async) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) (async) inotify_rm_watch(r2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000280)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000500)={0x9, 0x108, 0xfa00, {r6, 0x1, "c578e9", "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"}}, 0x110) 14:44:48 executing program 4: r0 = fsmount(0xffffffffffffffff, 0x1, 0xb) write$selinux_attr(r0, &(0x7f0000000080)='system_u:object_r:systemd_logind_exec_t:s0\x00', 0x2b) (async) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) write$selinux_attr(r0, &(0x7f00000006c0)='system_u:object_r:kmsg_device_t:s0\x00', 0x23) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r2) (async) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r3) (async) fsconfig$FSCONFIG_SET_PATH_EMPTY(r2, 0x4, &(0x7f0000000740)='syz0\x00', &(0x7f0000000780)='./file0\x00', r3) (async, rerun: 64) ioctl$IMSETDEVNAME(r0, 0x80184947, &(0x7f0000000700)={0x0, 'syz0\x00'}) (rerun: 64) sendmsg$DEVLINK_CMD_SB_PORT_POOL_SET(r0, &(0x7f0000000340)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB="44020000", @ANYRES16=r1, @ANYBLOB="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"], 0x244}, 0x1, 0x0, 0x0, 0x40000}, 0x10) (async) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r4) (async, rerun: 32) io_submit(0x0, 0x2, &(0x7f0000000680)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x5, 0x3, r0, &(0x7f00000000c0)="97fa1c993576db7aa5dd6b2c22b8ab57dab10c928827662cbced1b0ab7c80a013dbf68a19be53b3caaf5db50f4563fa1c9f0bca7ef2850f1f81bcfb530d21da5d01e72254ee5c3360ecbc7c1ebfe25dbcb9b66ff7590957ef4a589d461aa63fb5b043ddf3ba8937800e4f2df4458a460513844457d37286a7ba03950aa11e0960f20a65155ff0c8eaaff429de4c90e8b43159618003087bd592b7817b3333a24482fb6127a3d4a782512fabf1e663c26842e134e19941c22ed648b68d1aada616e400858669f53bd9cbe722a55b51595ae5e13788aca774665c59807ed9d1006b8f702f9", 0xe4, 0x9879, 0x0, 0x3, r4}, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x3, 0x6, r0, &(0x7f0000000200)="a82f7bb10e75fa1d2e4be27f5d280c7200754a10a7593763938ff9dc25968ad92870806d15fb548272dbf10f81e3c2a69ad0ef7500846ddd4e0fdd268077d8e6217d9e42e20360f41f05c73c91e26d2052bcae71d1076d0eb029c124bdbc960306dcfd0769d629216dd37fb6591cb72228777a3b212e6368882f8d7db85b06b95aeb6d3c2546d12b81abacbe4cb1d3a4d544192c99f6ba2b4fb824ab88bdc0555d9c5818bd00603e62ed63ead0aea25ac4f407338b1fad1178a9a4cdbced008d2a534e48ce895c7478cd36d2e40d1e9c5632db24dd9f326dfc3a631f5f8846a4ad03fa8e3d231a7cbf7fa88557bd55a3682402db", 0xf4, 0x8000, 0x0, 0x2}]) (async, rerun: 32) openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) 14:44:48 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "e0b3772264c43c79ea3709d20d36cc4637f10fb5de2d44e0a73f520c3612063189eaba7b99fa9556bcac2ba1fb34035db66efe1e7ea748d786f601d0dcc0875cb8313c7db8b6c64b414bd5a06373bc3fbdf80ab140bf4b8f6c4a991196664cd95bbff1abeb0e982cc9b17aac4b0381a35d7a53d098e99e432a3b2f69c8b9abd7356e7cc0700ff8a36c56bf3e8a01564cd35c263749dc7c61c59645ecda836dc9f9771ff0fcdeec9e4d22cc1722bacd35e0096e747dac83ef85aed84e433e8b13e27f70ad877ff1a53934e230ed382a6c4ff7a6c1d3bb2cee4b336dcd368e29a06ed88efe1806f129bfbdfccf6c5e3ba935eb8ad0af3928b311e0a1c89eca9c75"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}, 0xffffffffffffffff, 0x3000000}}, 0x120) 14:44:48 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x40000000, 0x0, "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"}}}, 0x20000260) 14:44:48 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r1) write$P9_RCREATE(r1, &(0x7f0000000000)={0x18, 0x73, 0x2, {{0x0, 0x4, 0x1}, 0x401}}, 0x18) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r2) fsmount(r2, 0x1, 0x4) mmap$IORING_OFF_SQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0x0) openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) (async) openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) (async) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r1) (async) write$P9_RCREATE(r1, &(0x7f0000000000)={0x18, 0x73, 0x2, {{0x0, 0x4, 0x1}, 0x401}}, 0x18) (async) openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) (async) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r2) (async) fsmount(r2, 0x1, 0x4) (async) mmap$IORING_OFF_SQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0x0) (async) 14:44:48 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}, 0xffffffffffffffff, 0x4000000}}, 0x120) 14:44:48 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) (async) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r1) (async) write$P9_RCREATE(r1, &(0x7f0000000000)={0x18, 0x73, 0x2, {{0x0, 0x4, 0x1}, 0x401}}, 0x18) (async) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r2) (async) fsmount(r2, 0x1, 0x4) mmap$IORING_OFF_SQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0x0) 14:44:48 executing program 4: r0 = fsmount(0xffffffffffffffff, 0x1, 0xb) write$selinux_attr(r0, &(0x7f0000000080)='system_u:object_r:systemd_logind_exec_t:s0\x00', 0x2b) (async) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) (async) write$selinux_attr(r0, &(0x7f00000006c0)='system_u:object_r:kmsg_device_t:s0\x00', 0x23) (async) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r2) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r3) (async) fsconfig$FSCONFIG_SET_PATH_EMPTY(r2, 0x4, &(0x7f0000000740)='syz0\x00', &(0x7f0000000780)='./file0\x00', r3) ioctl$IMSETDEVNAME(r0, 0x80184947, &(0x7f0000000700)={0x0, 'syz0\x00'}) (async) sendmsg$DEVLINK_CMD_SB_PORT_POOL_SET(r0, &(0x7f0000000340)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB="44020000", @ANYRES16=r1, @ANYBLOB="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"], 0x244}, 0x1, 0x0, 0x0, 0x40000}, 0x10) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r4) io_submit(0x0, 0x2, &(0x7f0000000680)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x5, 0x3, r0, &(0x7f00000000c0)="97fa1c993576db7aa5dd6b2c22b8ab57dab10c928827662cbced1b0ab7c80a013dbf68a19be53b3caaf5db50f4563fa1c9f0bca7ef2850f1f81bcfb530d21da5d01e72254ee5c3360ecbc7c1ebfe25dbcb9b66ff7590957ef4a589d461aa63fb5b043ddf3ba8937800e4f2df4458a460513844457d37286a7ba03950aa11e0960f20a65155ff0c8eaaff429de4c90e8b43159618003087bd592b7817b3333a24482fb6127a3d4a782512fabf1e663c26842e134e19941c22ed648b68d1aada616e400858669f53bd9cbe722a55b51595ae5e13788aca774665c59807ed9d1006b8f702f9", 0xe4, 0x9879, 0x0, 0x3, r4}, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x3, 0x6, r0, &(0x7f0000000200)="a82f7bb10e75fa1d2e4be27f5d280c7200754a10a7593763938ff9dc25968ad92870806d15fb548272dbf10f81e3c2a69ad0ef7500846ddd4e0fdd268077d8e6217d9e42e20360f41f05c73c91e26d2052bcae71d1076d0eb029c124bdbc960306dcfd0769d629216dd37fb6591cb72228777a3b212e6368882f8d7db85b06b95aeb6d3c2546d12b81abacbe4cb1d3a4d544192c99f6ba2b4fb824ab88bdc0555d9c5818bd00603e62ed63ead0aea25ac4f407338b1fad1178a9a4cdbced008d2a534e48ce895c7478cd36d2e40d1e9c5632db24dd9f326dfc3a631f5f8846a4ad03fa8e3d231a7cbf7fa88557bd55a3682402db", 0xf4, 0x8000, 0x0, 0x2}]) (async) openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) 14:44:48 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x101900, 0x0) (async, rerun: 32) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) (rerun: 32) write$RDMA_USER_CM_CMD_MIGRATE_ID(r1, &(0x7f0000000400)={0xd, 0x10, 0xfa00, {0x0}}, 0x18) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f0000000040)={0x12, 0x10, 0xfa00, {&(0x7f0000000000), 0xffffffffffffffff, r0}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e20, 0x40, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x7}, {0xa, 0x4e22, 0x0, @private2, 0x4}, 0xffffffffffffffff, 0x7fffffff}}, 0x48) (async) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r2) (async) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.net/syz0\x00', 0x200002, 0x0) r4 = getegid() ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r2, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r3, {0xffffffffffffffff, r4}}, './file0\x00'}) r5 = inotify_init() inotify_rm_watch(r5, 0x0) (async, rerun: 64) inotify_rm_watch(r5, 0x0) (rerun: 64) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) inotify_rm_watch(r2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000280)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000500)={0x9, 0x108, 0xfa00, {r6, 0x1, "c578e9", "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"}}, 0x110) [ 3595.250864][ T5345] FAULT_INJECTION: forcing a failure. [ 3595.250864][ T5345] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3595.264305][ T5345] CPU: 1 PID: 5345 Comm: syz-executor.0 Not tainted 5.17.0-rc2-syzkaller-00167-gdcb85f85fa6f-dirty #0 [ 3595.275248][ T5345] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3595.285307][ T5345] Call Trace: [ 3595.288587][ T5345] [ 3595.291516][ T5345] dump_stack_lvl+0xd6/0x122 [ 3595.296113][ T5345] dump_stack+0x11/0x1b 14:44:48 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) 14:44:48 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}, 0xffffffffffffffff, 0x5000000}}, 0x120) [ 3595.300383][ T5345] should_fail+0x23c/0x250 [ 3595.304900][ T5345] __alloc_pages+0x102/0x330 [ 3595.309502][ T5345] alloc_pages_vma+0x67e/0x810 [ 3595.314349][ T5345] ? percpu_counter_add_batch+0x109/0x130 [ 3595.320101][ T5345] shmem_getpage_gfp+0x8b4/0x12c0 [ 3595.325136][ T5345] ? do_user_addr_fault+0x7d4/0xb90 [ 3595.330701][ T5345] shmem_write_begin+0x7e/0x100 [ 3595.335693][ T5345] generic_perform_write+0x1c8/0x400 [ 3595.340991][ T5345] ? shmem_write_begin+0x100/0x100 14:44:48 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = inotify_init() inotify_rm_watch(r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x6000) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2, {0xee00, r3}}, './file0\x00'}) mmap$IORING_OFF_SQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0x0) [ 3595.346114][ T5345] __generic_file_write_iter+0xf7/0x2b0 [ 3595.351796][ T5345] ? generic_write_checks+0x242/0x290 [ 3595.357176][ T5345] generic_file_write_iter+0x75/0x130 [ 3595.362608][ T5345] vfs_write+0x7f5/0x950 [ 3595.366983][ T5345] ksys_write+0xd9/0x190 [ 3595.371229][ T5345] __x64_sys_write+0x3e/0x50 [ 3595.375824][ T5345] do_syscall_64+0x44/0xd0 [ 3595.380322][ T5345] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3595.386277][ T5345] RIP: 0033:0x7f9e8db3d059 [ 3595.390691][ T5345] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 3595.410301][ T5345] RSP: 002b:00007f9e8ccb3168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3595.418721][ T5345] RAX: ffffffffffffffda RBX: 00007f9e8dc4ff60 RCX: 00007f9e8db3d059 [ 3595.426704][ T5345] RDX: 0000000020000260 RSI: 0000000020000140 RDI: 0000000000000003 [ 3595.434719][ T5345] RBP: 00007f9e8ccb31d0 R08: 0000000000000000 R09: 0000000000000000 [ 3595.442689][ T5345] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 14:44:48 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x20000260) (fail_nth: 51) 14:44:48 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) io_setup(0x81, &(0x7f0000000000)=0x0) io_destroy(r2) io_getevents(r2, 0x0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r1) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) 14:44:48 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0xffffffff, 0x0, "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"}}}, 0x20000260) 14:44:48 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) (async) getresuid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) (async) 14:44:48 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "e0b3772264c43c79ea3709d20d36cc4637f10fb5de2d44e0a73f520c3612063189eaba7b99fa9556bcac2ba1fb34035db66efe1e7ea748d786f601d0dcc0875cb8313c7db8b6c64b414bd5a06373bc3fbdf80ab140bf4b8f6c4a991196664cd95bbff1abeb0e982cc9b17aac4b0381a35d7a53d098e99e432a3b2f69c8b9abd7356e7cc0700ff8a36c56bf3e8a01564cd35c263749dc7c61c59645ecda836dc9f9771ff0fcdeec9e4d22cc1722bacd35e0096e747dac83ef85aed84e433e8b13e27f70ad877ff1a53934e230ed382a6c4ff7a6c1d3bb2cee4b336dcd368e29a06ed88efe1806f129bfbdfccf6c5e3ba935eb8ad0af3928b311e0a1c89eca9c75"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}, 0xffffffffffffffff, 0x8000000}}, 0x120) 14:44:48 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = inotify_init() inotify_rm_watch(r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x6000) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2, {0xee00, r3}}, './file0\x00'}) mmap$IORING_OFF_SQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0x0) openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) (async) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) (async) inotify_init() (async) inotify_rm_watch(r2, 0x0) (async) newfstatat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x6000) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2, {0xee00, r3}}, './file0\x00'}) (async) mmap$IORING_OFF_SQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0x0) (async) 14:44:48 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "13bd94e32c37a3932d8ad7271907f2903ccf3bb13b387d8fdf025cdf3c8faa37a970ea456fa2fd6f8354fc3b05088269a6d5b022e392b9bd78e5e2308e054c3e2cbb6e61b42c74f3c1ba8d63d10ed85dcc5d58071547cdfd9661f05024bcf8d7722e987a76fced66d3b33373d61da648b231fe3de6f7dc9a78420b7bf0a04efb660e06f2bf671a2060d09d80f7ee6ba3ae0b6edf87d14be34012ef95719e01f065ec7943a48dcce0fcf8f7f3a89c24d940f201c7c73a3c97872a80ca25d1a3114fe16f225f4f55f3c6456cab8f0aa59d8efdc6939eb7f2b223ceff25db5222ff8e86c024229beec9ce765151d6e706fd60ab8ffe4c2e736eec4bcae53c1aaaef"}}}, 0x270) 14:44:48 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) (async) getresuid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) [ 3595.450664][ T5345] R13: 00007ffe952cf46f R14: 00007f9e8ccb3300 R15: 0000000000022000 [ 3595.458686][ T5345] [ 3595.490409][ T5368] FAULT_INJECTION: forcing a failure. [ 3595.490409][ T5368] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3595.503573][ T5368] CPU: 1 PID: 5368 Comm: syz-executor.0 Not tainted 5.17.0-rc2-syzkaller-00167-gdcb85f85fa6f-dirty #0 [ 3595.514510][ T5368] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3595.524564][ T5368] Call Trace: [ 3595.527849][ T5368] [ 3595.530785][ T5368] dump_stack_lvl+0xd6/0x122 [ 3595.535433][ T5368] dump_stack+0x11/0x1b [ 3595.539603][ T5368] should_fail+0x23c/0x250 [ 3595.544038][ T5368] should_fail_usercopy+0x16/0x20 [ 3595.549098][ T5368] copy_page_from_iter_atomic+0x2f1/0xcd0 [ 3595.554878][ T5368] ? shmem_write_begin+0x7e/0x100 [ 3595.559906][ T5368] generic_perform_write+0x211/0x400 [ 3595.565198][ T5368] ? shmem_write_begin+0x100/0x100 [ 3595.570380][ T5368] __generic_file_write_iter+0xf7/0x2b0 [ 3595.575925][ T5368] ? generic_write_checks+0x242/0x290 [ 3595.581303][ T5368] generic_file_write_iter+0x75/0x130 [ 3595.586683][ T5368] vfs_write+0x7f5/0x950 [ 3595.590950][ T5368] ksys_write+0xd9/0x190 [ 3595.595243][ T5368] __x64_sys_write+0x3e/0x50 14:44:48 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r0) r1 = io_uring_setup(0x5850, &(0x7f0000000000)={0x0, 0x4024, 0x4, 0x0, 0x2f5}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000080)=ANY=[@ANYBLOB="010000e60100000018000000", @ANYRES32=r1, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='./file0\x00']) openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000000c0), &(0x7f0000000100)=0x4) [ 3595.599912][ T5368] do_syscall_64+0x44/0xd0 [ 3595.604372][ T5368] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3595.610270][ T5368] RIP: 0033:0x7f9e8db3d059 [ 3595.614682][ T5368] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 3595.634307][ T5368] RSP: 002b:00007f9e8ccb3168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3595.642721][ T5368] RAX: ffffffffffffffda RBX: 00007f9e8dc4ff60 RCX: 00007f9e8db3d059 14:44:48 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r0) (async) r1 = io_uring_setup(0x5850, &(0x7f0000000000)={0x0, 0x4024, 0x4, 0x0, 0x2f5}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000080)=ANY=[@ANYBLOB="010000e60100000018000000", @ANYRES32=r1, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='./file0\x00']) (async) openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000000c0), &(0x7f0000000100)=0x4) 14:44:48 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) (async) r2 = inotify_init() inotify_rm_watch(r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x6000) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2, {0xee00, r3}}, './file0\x00'}) mmap$IORING_OFF_SQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0x0) 14:44:48 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0xeb0) [ 3595.650865][ T5368] RDX: 0000000020000260 RSI: 0000000020000140 RDI: 0000000000000003 [ 3595.658917][ T5368] RBP: 00007f9e8ccb31d0 R08: 0000000000000000 R09: 0000000000000000 [ 3595.666889][ T5368] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3595.674857][ T5368] R13: 00007ffe952cf46f R14: 00007f9e8ccb3300 R15: 0000000000022000 [ 3595.682832][ T5368] 14:44:48 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x20000260) (fail_nth: 52) 14:44:48 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r0) r1 = io_uring_setup(0x5850, &(0x7f0000000000)={0x0, 0x4024, 0x4, 0x0, 0x2f5}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000080)=ANY=[@ANYBLOB="010000e60100000018000000", @ANYRES32=r1, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='./file0\x00']) openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000000c0), &(0x7f0000000100)=0x4) openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) (async) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r0) (async) io_uring_setup(0x5850, &(0x7f0000000000)={0x0, 0x4024, 0x4, 0x0, 0x2f5}) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000080)=ANY=[@ANYBLOB="010000e60100000018000000", @ANYRES32=r1, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='./file0\x00']) (async) openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) (async) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000000c0), &(0x7f0000000100)=0x4) (async) 14:44:48 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0xfdef) 14:44:48 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) io_setup(0x81, &(0x7f0000000000)=0x0) io_destroy(r2) io_getevents(r2, 0x0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r1) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) (async) openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) (async) io_setup(0x81, &(0x7f0000000000)) (async) io_destroy(r2) (async) io_getevents(r2, 0x0, 0x0, 0x0, 0x0) (async) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r1) (async) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) (async) 14:44:48 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000080), 0x452281, 0x0) r1 = socket(0x10, 0x5, 0x7) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) socket(0x25, 0x1, 0xf2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1000001, 0x110, r0, 0x0) 14:44:48 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x20000260) 14:44:48 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000080), 0x452281, 0x0) r1 = socket(0x10, 0x5, 0x7) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) socket(0x25, 0x1, 0xf2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1000001, 0x110, r0, 0x0) 14:44:48 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x87ffeb0) 14:44:48 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x9, 0x22810, r0, 0x10000000) 14:44:49 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x9, 0x22810, r0, 0x10000000) 14:44:49 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x9, 0x22810, r0, 0x10000000) [ 3595.853463][ T5411] FAULT_INJECTION: forcing a failure. [ 3595.853463][ T5411] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3595.866743][ T5411] CPU: 1 PID: 5411 Comm: syz-executor.0 Not tainted 5.17.0-rc2-syzkaller-00167-gdcb85f85fa6f-dirty #0 [ 3595.877732][ T5411] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3595.887788][ T5411] Call Trace: [ 3595.891065][ T5411] [ 3595.894010][ T5411] dump_stack_lvl+0xd6/0x122 [ 3595.898638][ T5411] dump_stack+0x11/0x1b 14:44:49 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x9, 0x22810, r0, 0x10000000) [ 3595.902877][ T5411] should_fail+0x23c/0x250 [ 3595.907357][ T5411] __alloc_pages+0x102/0x330 [ 3595.911950][ T5411] alloc_pages_vma+0x67e/0x810 [ 3595.916721][ T5411] ? percpu_counter_add_batch+0x109/0x130 [ 3595.922440][ T5411] shmem_getpage_gfp+0x8b4/0x12c0 [ 3595.927466][ T5411] ? do_user_addr_fault+0x7d4/0xb90 [ 3595.932773][ T5411] shmem_write_begin+0x7e/0x100 [ 3595.937699][ T5411] generic_perform_write+0x1c8/0x400 [ 3595.942996][ T5411] ? shmem_write_begin+0x100/0x100 [ 3595.948107][ T5411] __generic_file_write_iter+0xf7/0x2b0 [ 3595.953656][ T5411] ? generic_write_checks+0x242/0x290 [ 3595.959035][ T5411] generic_file_write_iter+0x75/0x130 [ 3595.964433][ T5411] vfs_write+0x7f5/0x950 [ 3595.968677][ T5411] ksys_write+0xd9/0x190 [ 3595.972972][ T5411] __x64_sys_write+0x3e/0x50 [ 3595.977557][ T5411] do_syscall_64+0x44/0xd0 [ 3595.981972][ T5411] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3595.987863][ T5411] RIP: 0033:0x7f9e8db3d059 [ 3595.992282][ T5411] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 3596.011889][ T5411] RSP: 002b:00007f9e8ccb3168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3596.020298][ T5411] RAX: ffffffffffffffda RBX: 00007f9e8dc4ff60 RCX: 00007f9e8db3d059 [ 3596.028262][ T5411] RDX: 0000000020000260 RSI: 0000000020000140 RDI: 0000000000000003 [ 3596.036233][ T5411] RBP: 00007f9e8ccb31d0 R08: 0000000000000000 R09: 0000000000000000 [ 3596.044199][ T5411] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 14:44:49 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x20000260) (fail_nth: 53) 14:44:49 executing program 4: mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x9, 0x22810, 0xffffffffffffffff, 0x10000000) 14:44:49 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000080), 0x452281, 0x0) (async) r1 = socket(0x10, 0x5, 0x7) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) (async) socket(0x25, 0x1, 0xf2) (async) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1000001, 0x110, r0, 0x0) [ 3596.052165][ T5411] R13: 00007ffe952cf46f R14: 00007f9e8ccb3300 R15: 0000000000022000 [ 3596.060136][ T5411] [ 3596.090560][ T5438] FAULT_INJECTION: forcing a failure. [ 3596.090560][ T5438] name fail_usercopy, interval 1, probability 0, space 0, times 0 14:44:49 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) io_setup(0x81, &(0x7f0000000000)=0x0) io_destroy(r2) io_getevents(r2, 0x0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r1) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) (async) openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) (async) io_setup(0x81, &(0x7f0000000000)) (async) io_destroy(r2) (async) io_getevents(r2, 0x0, 0x0, 0x0, 0x0) (async) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r1) (async) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) (async) 14:44:49 executing program 4: mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x9, 0x22810, 0xffffffffffffffff, 0x10000000) [ 3596.103763][ T5438] CPU: 1 PID: 5438 Comm: syz-executor.0 Not tainted 5.17.0-rc2-syzkaller-00167-gdcb85f85fa6f-dirty #0 [ 3596.114710][ T5438] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3596.124802][ T5438] Call Trace: [ 3596.128079][ T5438] [ 3596.131079][ T5438] dump_stack_lvl+0xd6/0x122 [ 3596.135676][ T5438] dump_stack+0x11/0x1b [ 3596.139840][ T5438] should_fail+0x23c/0x250 [ 3596.144379][ T5438] should_fail_usercopy+0x16/0x20 14:44:49 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x2, "13bd94e32c37a3932d8ad7271907f2903ccf3bb13b387d8fdf025cdf3c8faa37a970ea456fa2fd6f8354fc3b05088269a6d5b022e392b9bd78e5e2308e054c3e2cbb6e61b42c74f3c1ba8d63d10ed85dcc5d58071547cdfd9661f05024bcf8d7722e987a76fced66d3b33373d61da648b231fe3de6f7dc9a78420b7bf0a04efb660e06f2bf671a2060d09d80f7ee6ba3ae0b6edf87d14be34012ef95719e01f065ec7943a48dcce0fcf8f7f3a89c24d940f201c7c73a3c97872a80ca25d1a3114fe16f225f4f55f3c6456cab8f0aa59d8efdc6939eb7f2b223ceff25db5222ff8e86c024229beec9ce765151d6e706fd60ab8ffe4c2e736eec4bcae53c1aaaef"}}}, 0x20000260) 14:44:49 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "13bd94e32c37a3932d8ad7271907f2903ccf3bb13b387d8fdf025cdf3c8faa37a970ea456fa2fd6f8354fc3b05088269a6d5b022e392b9bd78e5e2308e054c3e2cbb6e61b42c74f3c1ba8d63d10ed85dcc5d58071547cdfd9661f05024bcf8d7722e987a76fced66d3b33373d61da648b231fe3de6f7dc9a78420b7bf0a04efb660e06f2bf671a2060d09d80f7ee6ba3ae0b6edf87d14be34012ef95719e01f065ec7943a48dcce0fcf8f7f3a89c24d940f201c7c73a3c97872a80ca25d1a3114fe16f225f4f55f3c6456cab8f0aa59d8efdc6939eb7f2b223ceff25db5222ff8e86c024229beec9ce765151d6e706fd60ab8ffe4c2e736eec4bcae53c1aaaef"}}}, 0x20000260) 14:44:49 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2, 0x1010, r0, 0x8000000) [ 3596.149443][ T5438] copy_page_from_iter_atomic+0x2f1/0xcd0 [ 3596.155175][ T5438] ? shmem_write_begin+0x7e/0x100 [ 3596.160221][ T5438] generic_perform_write+0x211/0x400 [ 3596.165581][ T5438] ? shmem_write_begin+0x100/0x100 [ 3596.170749][ T5438] __generic_file_write_iter+0xf7/0x2b0 [ 3596.176364][ T5438] ? generic_write_checks+0x242/0x290 [ 3596.181797][ T5438] generic_file_write_iter+0x75/0x130 [ 3596.187165][ T5438] vfs_write+0x7f5/0x950 [ 3596.191482][ T5438] ksys_write+0xd9/0x190 [ 3596.195717][ T5438] __x64_sys_write+0x3e/0x50 [ 3596.200311][ T5438] do_syscall_64+0x44/0xd0 [ 3596.204765][ T5438] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3596.210661][ T5438] RIP: 0033:0x7f9e8db3d059 [ 3596.215130][ T5438] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 3596.234812][ T5438] RSP: 002b:00007f9e8ccb3168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3596.243231][ T5438] RAX: ffffffffffffffda RBX: 00007f9e8dc4ff60 RCX: 00007f9e8db3d059 14:44:49 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2, 0x1010, r0, 0x8000000) 14:44:49 executing program 4: mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x9, 0x22810, 0xffffffffffffffff, 0x10000000) 14:44:49 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, 0x0, 0x452281, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x9, 0x22810, r0, 0x10000000) 14:44:49 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2, 0x1010, r0, 0x8000000) [ 3596.251266][ T5438] RDX: 0000000020000260 RSI: 0000000020000140 RDI: 0000000000000003 [ 3596.259236][ T5438] RBP: 00007f9e8ccb31d0 R08: 0000000000000000 R09: 0000000000000000 [ 3596.267203][ T5438] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3596.275172][ T5438] R13: 00007ffe952cf46f R14: 00007f9e8ccb3300 R15: 0000000000022000 [ 3596.283144][ T5438] 14:44:49 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x20000260) (fail_nth: 54) 14:44:49 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, 0x0, 0x452281, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x9, 0x22810, r0, 0x10000000) 14:44:49 executing program 5: openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r0) mmap$IORING_OFF_SQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x810, r0, 0x0) 14:44:49 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000300)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x0, 0xffffffffffffffff, 0x1c, 0x1, @ib={0x1b, 0x7, 0x4, {"35b84ba162873d41966fba342fab73cc"}, 0x200, 0x200, 0x6}}}, 0xa0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, {0xee00, 0xee01}}, './file0\x00'}) write$P9_RXATTRCREATE(r1, &(0x7f00000000c0)={0x7, 0x21, 0x2}, 0x7) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000015c88001800790100", @ANYRES32=r0, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="b0c28b74adc0f426733d0f8ea92c5fffac5331e0b4"]) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000500)={0x16, 0x98, 0xfa00, {&(0x7f0000000100), 0x4, 0xffffffffffffffff, 0x10, 0x0, @in={0x2, 0x4e24, @private=0xa010102}}}, 0xa0) 14:44:49 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x3, "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"}}}, 0x20000260) 14:44:49 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "e0b3772264c43c79ea3709d20d36cc4637f10fb5de2d44e0a73f520c3612063189eaba7b99fa9556bcac2ba1fb34035db66efe1e7ea748d786f601d0dcc0875cb8313c7db8b6c64b414bd5a06373bc3fbdf80ab140bf4b8f6c4a991196664cd95bbff1abeb0e982cc9b17aac4b0381a35d7a53d098e99e432a3b2f69c8b9abd7356e7cc0700ff8a36c56bf3e8a01564cd35c263749dc7c61c59645ecda836dc9f9771ff0fcdeec9e4d22cc1722bacd35e0096e747dac83ef85aed84e433e8b13e27f70ad877ff1a53934e230ed382a6c4ff7a6c1d3bb2cee4b336dcd368e29a06ed88efe1806f129bfbdfccf6c5e3ba935eb8ad0af3928b311e0a1c89eca9c75"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "13bd94e32c37a3932d8ad7271907f2903ccf3bb13b387d8fdf025cdf3c8faa37a970ea456fa2fd6f8354fc3b05088269a6d5b022e392b9bd78e5e2308e054c3e2cbb6e61b42c74f3c1ba8d63d10ed85dcc5d58071547cdfd9661f05024bcf8d7722e987a76fced66d3b33373d61da648b231fe3de6f7dc9a78420b7bf0a04efb660e06f2bf671a2060d09d80f7ee6ba3ae0b6edf87d14be34012ef95719e01f065ec7943a48dcce0fcf8f7f3a89c24d940f201c7c73a3c97872a80ca25d1a3114fe16f225f4f55f3c6456cab8f0aa59d8efdc6939eb7f2b223ceff25db5222ff8e86c024229beec9ce765151d6e706fd60ab8ffe4c2e736eec4bcae53c1aaaef"}}}, 0x7ffff000) 14:44:49 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000300)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x0, 0xffffffffffffffff, 0x1c, 0x1, @ib={0x1b, 0x7, 0x4, {"35b84ba162873d41966fba342fab73cc"}, 0x200, 0x200, 0x6}}}, 0xa0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "e0b3772264c43c79ea3709d20d36cc4637f10fb5de2d44e0a73f520c3612063189eaba7b99fa9556bcac2ba1fb34035db66efe1e7ea748d786f601d0dcc0875cb8313c7db8b6c64b414bd5a06373bc3fbdf80ab140bf4b8f6c4a991196664cd95bbff1abeb0e982cc9b17aac4b0381a35d7a53d098e99e432a3b2f69c8b9abd7356e7cc0700ff8a36c56bf3e8a01564cd35c263749dc7c61c59645ecda836dc9f9771ff0fcdeec9e4d22cc1722bacd35e0096e747dac83ef85aed84e433e8b13e27f70ad877ff1a53934e230ed382a6c4ff7a6c1d3bb2cee4b336dcd368e29a06ed88efe1806f129bfbdfccf6c5e3ba935eb8ad0af3928b311e0a1c89eca9c75"}}, 0x110) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, {0xee00, 0xee01}}, './file0\x00'}) write$P9_RXATTRCREATE(r1, &(0x7f00000000c0)={0x7, 0x21, 0x2}, 0x7) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000015c88001800790100", @ANYRES32=r0, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="b0c28b74adc0f426733d0f8ea92c5fffac5331e0b4"]) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000500)={0x16, 0x98, 0xfa00, {&(0x7f0000000100), 0x4, 0xffffffffffffffff, 0x10, 0x0, @in={0x2, 0x4e24, @private=0xa010102}}}, 0xa0) 14:44:49 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, 0x0, 0x452281, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x9, 0x22810, r0, 0x10000000) [ 3596.508290][ T5472] FAULT_INJECTION: forcing a failure. [ 3596.508290][ T5472] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3596.521623][ T5472] CPU: 0 PID: 5472 Comm: syz-executor.0 Not tainted 5.17.0-rc2-syzkaller-00167-gdcb85f85fa6f-dirty #0 [ 3596.532646][ T5472] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3596.542696][ T5472] Call Trace: [ 3596.545969][ T5472] [ 3596.548894][ T5472] dump_stack_lvl+0xd6/0x122 [ 3596.553562][ T5472] dump_stack+0x11/0x1b [ 3596.557751][ T5472] should_fail+0x23c/0x250 [ 3596.562436][ T5472] __alloc_pages+0x102/0x330 [ 3596.567030][ T5472] alloc_pages_vma+0x67e/0x810 [ 3596.571856][ T5472] ? percpu_counter_add_batch+0x109/0x130 [ 3596.577624][ T5472] shmem_getpage_gfp+0x8b4/0x12c0 [ 3596.582653][ T5472] ? do_user_addr_fault+0x7d4/0xb90 [ 3596.587858][ T5472] shmem_write_begin+0x7e/0x100 [ 3596.592711][ T5472] generic_perform_write+0x1c8/0x400 [ 3596.598002][ T5472] ? shmem_write_begin+0x100/0x100 [ 3596.603118][ T5472] __generic_file_write_iter+0xf7/0x2b0 [ 3596.608672][ T5472] ? generic_write_checks+0x242/0x290 [ 3596.614042][ T5472] generic_file_write_iter+0x75/0x130 [ 3596.619425][ T5472] vfs_write+0x7f5/0x950 [ 3596.623699][ T5472] ksys_write+0xd9/0x190 [ 3596.627937][ T5472] __x64_sys_write+0x3e/0x50 [ 3596.632556][ T5472] do_syscall_64+0x44/0xd0 [ 3596.636972][ T5472] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3596.642871][ T5472] RIP: 0033:0x7f9e8db3d059 [ 3596.647273][ T5472] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 3596.666964][ T5472] RSP: 002b:00007f9e8ccb3168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3596.675372][ T5472] RAX: ffffffffffffffda RBX: 00007f9e8dc4ff60 RCX: 00007f9e8db3d059 [ 3596.683346][ T5472] RDX: 0000000020000260 RSI: 0000000020000140 RDI: 0000000000000003 [ 3596.691319][ T5472] RBP: 00007f9e8ccb31d0 R08: 0000000000000000 R09: 0000000000000000 [ 3596.699293][ T5472] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 14:44:49 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x9, 0x22810, r0, 0x10000000) 14:44:49 executing program 5: openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r0) mmap$IORING_OFF_SQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x810, r0, 0x0) openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) (async) openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) (async) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r0) (async) mmap$IORING_OFF_SQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x810, r0, 0x0) (async) 14:44:49 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x9, 0x22810, r0, 0x10000000) 14:44:49 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x9, 0x22810, r0, 0x10000000) 14:44:49 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x20000260) (fail_nth: 55) 14:44:49 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x22810, r0, 0x10000000) 14:44:49 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000300)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x0, 0xffffffffffffffff, 0x1c, 0x1, @ib={0x1b, 0x7, 0x4, {"35b84ba162873d41966fba342fab73cc"}, 0x200, 0x200, 0x6}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "e0b3772264c43c79ea3709d20d36cc4637f10fb5de2d44e0a73f520c3612063189eaba7b99fa9556bcac2ba1fb34035db66efe1e7ea748d786f601d0dcc0875cb8313c7db8b6c64b414bd5a06373bc3fbdf80ab140bf4b8f6c4a991196664cd95bbff1abeb0e982cc9b17aac4b0381a35d7a53d098e99e432a3b2f69c8b9abd7356e7cc0700ff8a36c56bf3e8a01564cd35c263749dc7c61c59645ecda836dc9f9771ff0fcdeec9e4d22cc1722bacd35e0096e747dac83ef85aed84e433e8b13e27f70ad877ff1a53934e230ed382a6c4ff7a6c1d3bb2cee4b336dcd368e29a06ed88efe1806f129bfbdfccf6c5e3ba935eb8ad0af3928b311e0a1c89eca9c75"}}, 0x110) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, {0xee00, 0xee01}}, './file0\x00'}) write$P9_RXATTRCREATE(r1, &(0x7f00000000c0)={0x7, 0x21, 0x2}, 0x7) (async) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000015c88001800790100", @ANYRES32=r0, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="b0c28b74adc0f426733d0f8ea92c5fffac5331e0b4"]) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000500)={0x16, 0x98, 0xfa00, {&(0x7f0000000100), 0x4, 0xffffffffffffffff, 0x10, 0x0, @in={0x2, 0x4e24, @private=0xa010102}}}, 0xa0) 14:44:49 executing program 5: openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) (async, rerun: 64) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) (rerun: 64) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r0) (async, rerun: 32) mmap$IORING_OFF_SQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x810, r0, 0x0) (rerun: 32) [ 3596.707265][ T5472] R13: 00007ffe952cf46f R14: 00007f9e8ccb3300 R15: 0000000000022000 [ 3596.715238][ T5472] [ 3596.758860][ T5493] FAULT_INJECTION: forcing a failure. [ 3596.758860][ T5493] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3596.771951][ T5493] CPU: 1 PID: 5493 Comm: syz-executor.0 Not tainted 5.17.0-rc2-syzkaller-00167-gdcb85f85fa6f-dirty #0 [ 3596.782885][ T5493] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3596.793017][ T5493] Call Trace: [ 3596.796297][ T5493] [ 3596.799237][ T5493] dump_stack_lvl+0xd6/0x122 [ 3596.803859][ T5493] dump_stack+0x11/0x1b [ 3596.808095][ T5493] should_fail+0x23c/0x250 [ 3596.812514][ T5493] should_fail_usercopy+0x16/0x20 [ 3596.817581][ T5493] copy_page_from_iter_atomic+0x2f1/0xcd0 [ 3596.823385][ T5493] ? shmem_write_begin+0x7e/0x100 [ 3596.828420][ T5493] generic_perform_write+0x211/0x400 [ 3596.833706][ T5493] ? shmem_write_begin+0x100/0x100 [ 3596.838873][ T5493] __generic_file_write_iter+0xf7/0x2b0 [ 3596.844421][ T5493] ? generic_write_checks+0x242/0x290 [ 3596.849798][ T5493] generic_file_write_iter+0x75/0x130 [ 3596.855171][ T5493] vfs_write+0x7f5/0x950 [ 3596.859416][ T5493] ksys_write+0xd9/0x190 [ 3596.863722][ T5493] __x64_sys_write+0x3e/0x50 [ 3596.868316][ T5493] do_syscall_64+0x44/0xd0 [ 3596.872770][ T5493] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3596.878675][ T5493] RIP: 0033:0x7f9e8db3d059 [ 3596.883187][ T5493] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 14:44:49 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x4, "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"}}}, 0x20000260) 14:44:49 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0xfffffdef) 14:44:49 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x10, r0, 0x10000000) 14:44:50 executing program 5: openat$bsg(0xffffffffffffff9c, &(0x7f0000000040), 0x599e00, 0x0) io_setup(0x100, &(0x7f0000000080)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={0xffffffffffffffff}, 0x4) 14:44:50 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x10, r0, 0x10000000) 14:44:50 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "13bd94e32c37a3932d8ad7271907f2903ccf3bb13b387d8fdf025cdf3c8faa37a970ea456fa2fd6f8354fc3b05088269a6d5b022e392b9bd78e5e2308e054c3e2cbb6e61b42c74f3c1ba8d63d10ed85dcc5d58071547cdfd9661f05024bcf8d7722e987a76fced66d3b33373d61da648b231fe3de6f7dc9a78420b7bf0a04efb660e06f2bf671a2060d09d80f7ee6ba3ae0b6edf87d14be34012ef95719e01f065ec7943a48dcce0fcf8f7f3a89c24d940f201c7c73a3c97872a80ca25d1a3114fe16f225f4f55f3c6456cab8f0aa59d8efdc6939eb7f2b223ceff25db5222ff8e86c024229beec9ce765151d6e706fd60ab8ffe4c2e736eec4bcae53c1aaaef"}}}, 0x120) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r1) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}, 0x111, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x3, {0xa, 0x4e21, 0x5, @mcast1, 0x1}, r2}}, 0x38) 14:44:50 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x10, r0, 0x10000000) [ 3596.902791][ T5493] RSP: 002b:00007f9e8ccb3168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3596.911211][ T5493] RAX: ffffffffffffffda RBX: 00007f9e8dc4ff60 RCX: 00007f9e8db3d059 [ 3596.919205][ T5493] RDX: 0000000020000260 RSI: 0000000020000140 RDI: 0000000000000003 [ 3596.927178][ T5493] RBP: 00007f9e8ccb31d0 R08: 0000000000000000 R09: 0000000000000000 [ 3596.935152][ T5493] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3596.943121][ T5493] R13: 00007ffe952cf46f R14: 00007f9e8ccb3300 R15: 0000000000022000 [ 3596.951198][ T5493] 14:44:50 executing program 4: openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x22810, 0xffffffffffffffff, 0x10000000) 14:44:50 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x20000260) (fail_nth: 56) 14:44:50 executing program 5: openat$bsg(0xffffffffffffff9c, &(0x7f0000000040), 0x599e00, 0x0) (async) io_setup(0x100, &(0x7f0000000080)) (async) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={0xffffffffffffffff}, 0x4) 14:44:50 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) (async, rerun: 64) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) (async, rerun: 64) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r1) (async, rerun: 64) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}, 0x111, 0x2}}, 0x20) (rerun: 64) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x3, {0xa, 0x4e21, 0x5, @mcast1, 0x1}, r2}}, 0x38) 14:44:50 executing program 4: openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x22810, 0xffffffffffffffff, 0x10000000) 14:44:50 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x7ffffffffffffeaf) 14:44:50 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x5, "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"}}}, 0x20000260) 14:44:50 executing program 4: openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x22810, 0xffffffffffffffff, 0x10000000) 14:44:50 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) (async, rerun: 32) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) (async, rerun: 32) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r1) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}, 0x111, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x3, {0xa, 0x4e21, 0x5, @mcast1, 0x1}, r2}}, 0x38) 14:44:50 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0xfffffffffffffdef) 14:44:50 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0xffffffffffffffff) [ 3597.186870][ T5537] FAULT_INJECTION: forcing a failure. [ 3597.186870][ T5537] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3597.200146][ T5537] CPU: 1 PID: 5537 Comm: syz-executor.0 Not tainted 5.17.0-rc2-syzkaller-00167-gdcb85f85fa6f-dirty #0 [ 3597.211125][ T5537] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3597.221181][ T5537] Call Trace: [ 3597.224458][ T5537] [ 3597.227389][ T5537] dump_stack_lvl+0xd6/0x122 [ 3597.231991][ T5537] dump_stack+0x11/0x1b 14:44:50 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r2) write$RDMA_USER_CM_CMD_MIGRATE_ID(r2, &(0x7f0000000040)={0x12, 0x10, 0xfa00, {&(0x7f0000000000), 0xffffffffffffffff, r0}}, 0x18) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r1) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}}, 0x120) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r4, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r5}}, 0x10) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f00000000c0)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000080)=0x1, r5, 0x0, 0x1, 0x4}}, 0x20) 14:44:50 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r2) write$RDMA_USER_CM_CMD_MIGRATE_ID(r2, &(0x7f0000000040)={0x12, 0x10, 0xfa00, {&(0x7f0000000000), 0xffffffffffffffff, r0}}, 0x18) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r1) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}}, 0x120) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r4, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r5}}, 0x10) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f00000000c0)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000080)=0x1, r5, 0x0, 0x1, 0x4}}, 0x20) openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) (async) openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) (async) openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) (async) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r2) (async) write$RDMA_USER_CM_CMD_MIGRATE_ID(r2, &(0x7f0000000040)={0x12, 0x10, 0xfa00, {&(0x7f0000000000), 0xffffffffffffffff, r0}}, 0x18) (async) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r1) (async) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}}, 0x120) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_NOTIFY(r4, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r5}}, 0x10) (async) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f00000000c0)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000080)=0x1, r5, 0x0, 0x1, 0x4}}, 0x20) (async) [ 3597.236189][ T5537] should_fail+0x23c/0x250 [ 3597.240656][ T5537] __alloc_pages+0x102/0x330 [ 3597.245254][ T5537] alloc_pages_vma+0x67e/0x810 [ 3597.250033][ T5537] ? percpu_counter_add_batch+0x109/0x130 [ 3597.255760][ T5537] shmem_getpage_gfp+0x8b4/0x12c0 [ 3597.260876][ T5537] ? do_user_addr_fault+0x7d4/0xb90 [ 3597.266295][ T5537] shmem_write_begin+0x7e/0x100 [ 3597.271194][ T5537] generic_perform_write+0x1c8/0x400 [ 3597.276492][ T5537] ? shmem_write_begin+0x100/0x100 [ 3597.281613][ T5537] __generic_file_write_iter+0xf7/0x2b0 [ 3597.287175][ T5537] ? generic_write_checks+0x242/0x290 [ 3597.292629][ T5537] generic_file_write_iter+0x75/0x130 [ 3597.298009][ T5537] vfs_write+0x7f5/0x950 [ 3597.302262][ T5537] ksys_write+0xd9/0x190 [ 3597.306511][ T5537] __x64_sys_write+0x3e/0x50 [ 3597.311200][ T5537] do_syscall_64+0x44/0xd0 [ 3597.315618][ T5537] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3597.321522][ T5537] RIP: 0033:0x7f9e8db3d059 [ 3597.325931][ T5537] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 3597.345583][ T5537] RSP: 002b:00007f9e8ccb3168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3597.354040][ T5537] RAX: ffffffffffffffda RBX: 00007f9e8dc4ff60 RCX: 00007f9e8db3d059 [ 3597.362008][ T5537] RDX: 0000000020000260 RSI: 0000000020000140 RDI: 0000000000000003 [ 3597.369979][ T5537] RBP: 00007f9e8ccb31d0 R08: 0000000000000000 R09: 0000000000000000 [ 3597.377941][ T5537] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 14:44:50 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "13bd94e32c37a3932d8ad7271907f2903ccf3bb13b387d8fdf025cdf3c8faa37a970ea456fa2fd6f8354fc3b05088269a6d5b022e392b9bd78e5e2308e054c3e2cbb6e61b42c74f3c1ba8d63d10ed85dcc5d58071547cdfd9661f05024bcf8d7722e987a76fced66d3b33373d61da648b231fe3de6f7dc9a78420b7bf0a04efb660e06f2bf671a2060d09d80f7ee6ba3ae0b6edf87d14be34012ef95719e01f065ec7943a48dcce0fcf8f7f3a89c24d940f201c7c73a3c97872a80ca25d1a3114fe16f225f4f55f3c6456cab8f0aa59d8efdc6939eb7f2b223ceff25db5222ff8e86c024229beec9ce765151d6e706fd60ab8ffe4c2e736eec4bcae53c1aaaef"}}}, 0x20000260) (fail_nth: 57) [ 3597.386081][ T5537] R13: 00007ffe952cf46f R14: 00007f9e8ccb3300 R15: 0000000000022000 [ 3597.394061][ T5537] [ 3597.419798][ T5564] FAULT_INJECTION: forcing a failure. [ 3597.419798][ T5564] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3597.432901][ T5564] CPU: 0 PID: 5564 Comm: syz-executor.0 Not tainted 5.17.0-rc2-syzkaller-00167-gdcb85f85fa6f-dirty #0 [ 3597.443889][ T5564] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3597.453919][ T5564] Call Trace: [ 3597.457225][ T5564] [ 3597.460185][ T5564] dump_stack_lvl+0xd6/0x122 [ 3597.464796][ T5564] dump_stack+0x11/0x1b [ 3597.469001][ T5564] should_fail+0x23c/0x250 [ 3597.473442][ T5564] should_fail_usercopy+0x16/0x20 [ 3597.478449][ T5564] copy_page_from_iter_atomic+0x2f1/0xcd0 [ 3597.484251][ T5564] ? shmem_write_begin+0x7e/0x100 [ 3597.489259][ T5564] generic_perform_write+0x211/0x400 [ 3597.494555][ T5564] ? shmem_write_begin+0x100/0x100 [ 3597.499651][ T5564] __generic_file_write_iter+0xf7/0x2b0 [ 3597.505242][ T5564] ? generic_write_checks+0x242/0x290 [ 3597.510595][ T5564] generic_file_write_iter+0x75/0x130 [ 3597.515946][ T5564] vfs_write+0x7f5/0x950 [ 3597.520169][ T5564] ksys_write+0xd9/0x190 [ 3597.524416][ T5564] __x64_sys_write+0x3e/0x50 [ 3597.528982][ T5564] do_syscall_64+0x44/0xd0 [ 3597.533377][ T5564] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3597.539523][ T5564] RIP: 0033:0x7f9e8db3d059 [ 3597.543992][ T5564] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 3597.563629][ T5564] RSP: 002b:00007f9e8ccb3168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3597.572035][ T5564] RAX: ffffffffffffffda RBX: 00007f9e8dc4ff60 RCX: 00007f9e8db3d059 [ 3597.580046][ T5564] RDX: 0000000020000260 RSI: 0000000020000140 RDI: 0000000000000003 14:44:50 executing program 5: openat$bsg(0xffffffffffffff9c, &(0x7f0000000040), 0x599e00, 0x0) io_setup(0x100, &(0x7f0000000080)) (async, rerun: 64) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={0xffffffffffffffff}, 0x4) (rerun: 64) 14:44:50 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000700), 0x80001, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r1) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) r5 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r5) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000500)={0x9, 0x108, 0xfa00, {r4, 0x6, "d0f484", "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"}}, 0x110) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r4}}, 0x10) r6 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r6) r7 = syz_genetlink_get_family_id$devlink(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RATE_GET(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)=ANY=[@ANYBLOB='d\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="00012bbd7000ffdbdf254a0000000e0001edff000064657673696d0000000f0002006e657464657673696d3000000e00a80066697273746e616d650000000e0001006e657464657673696d0000000f0002006e657464657673696d300000"], 0x64}, 0x1, 0x0, 0x0, 0x24048084}, 0x0) sendmsg$DEVLINK_CMD_PORT_UNSPLIT(r6, &(0x7f0000000380)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000340)={&(0x7f0000000640)=ANY=[@ANYBLOB="84000000", @ANYRES16=r7, @ANYBLOB="00012abd7000ffdbdf250a000000080001007063690011000200303030303a30303a31302e300000000008000300030000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008001b0000000000080001007063690011000200303030303a30303a31302e30000000000800030002000000"], 0x84}, 0x1, 0x0, 0x0, 0x4000}, 0x24044085) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000080)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x2, r4, 0x30, 0x1, @in6={0xa, 0x4e21, 0x91c, @loopback}}}, 0xa0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x10}}}, 0x120) 14:44:50 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x20000260) 14:44:50 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "e0b3772264c43c79ea3709d20d36cc4637f10fb5de2d44e0a73f520c3612063189eaba7b99fa9556bcac2ba1fb34035db66efe1e7ea748d786f601d0dcc0875cb8313c7db8b6c64b414bd5a06373bc3fbdf80ab140bf4b8f6c4a991196664cd95bbff1abeb0e982cc9b17aac4b0381a35d7a53d098e99e432a3b2f69c8b9abd7356e7cc0700ff8a36c56bf3e8a01564cd35c263749dc7c61c59645ecda836dc9f9771ff0fcdeec9e4d22cc1722bacd35e0096e747dac83ef85aed84e433e8b13e27f70ad877ff1a53934e230ed382a6c4ff7a6c1d3bb2cee4b336dcd368e29a06ed88efe1806f129bfbdfccf6c5e3ba935eb8ad0af3928b311e0a1c89eca9c75"}}, 0x110) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) (async) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r2) write$RDMA_USER_CM_CMD_MIGRATE_ID(r2, &(0x7f0000000040)={0x12, 0x10, 0xfa00, {&(0x7f0000000000), 0xffffffffffffffff, r0}}, 0x18) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r1) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}}, 0x120) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r4, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r5}}, 0x10) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f00000000c0)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000080)=0x1, r5, 0x0, 0x1, 0x4}}, 0x20) 14:44:50 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x6, "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"}}}, 0x20000260) 14:44:50 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000700), 0x80001, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r1) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) r5 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r5) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000500)={0x9, 0x108, 0xfa00, {r4, 0x6, "d0f484", "86d3d10ca9b484dc75dbf784ffce98b9b5b9ce1e9dd36cb29030baf52943e3bc3da9395713282cb7706385d619ea15300b9e166476bcd1f9f60fc13757be6bbe1ae45fb1e5a87cb8545e4a630726b2bf553a8e346995a9c8d5ee30bf91e17ba3fd0d209ce27ac9e371c9ebbbe303a29d4f2e7bdd20ec3b27053d81840ea16e937c5215fc828391e0ceb1c5cacfc4721a490fbdeac44c27f703030a0fada0e7234ad3285144f0963abc4f69290e1af04f544964991df1226b1f11aad0719e02b559e50bd58ddafd7e21f392febe9e72078c97989530b8318d7fc7e2f27fa14d89510894237be3e725e75fe0b18a87e92dc5e084cd09e9632dad823fd2a7e6f8c9"}}, 0x110) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r4}}, 0x10) r6 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r6) r7 = syz_genetlink_get_family_id$devlink(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RATE_GET(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)=ANY=[@ANYBLOB='d\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="00012bbd7000ffdbdf254a0000000e0001edff000064657673696d0000000f0002006e657464657673696d3000000e00a80066697273746e616d650000000e0001006e657464657673696d0000000f0002006e657464657673696d300000"], 0x64}, 0x1, 0x0, 0x0, 0x24048084}, 0x0) sendmsg$DEVLINK_CMD_PORT_UNSPLIT(r6, &(0x7f0000000380)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000340)={&(0x7f0000000640)=ANY=[@ANYBLOB="84000000", @ANYRES16=r7, @ANYBLOB="00012abd7000ffdbdf250a000000080001007063690011000200303030303a30303a31302e300000000008000300030000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008001b0000000000080001007063690011000200303030303a30303a31302e30000000000800030002000000"], 0x84}, 0x1, 0x0, 0x0, 0x4000}, 0x24044085) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000080)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x2, r4, 0x30, 0x1, @in6={0xa, 0x4e21, 0x91c, @loopback}}}, 0xa0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "13bd94e32c37a3932d8ad7271907f2903ccf3bb13b387d8fdf025cdf3c8faa37a970ea456fa2fd6f8354fc3b05088269a6d5b022e392b9bd78e5e2308e054c3e2cbb6e61b42c74f3c1ba8d63d10ed85dcc5d58071547cdfd9661f05024bcf8d7722e987a76fced66d3b33373d61da648b231fe3de6f7dc9a78420b7bf0a04efb660e06f2bf671a2060d09d80f7ee6ba3ae0b6edf87d14be34012ef95719e01f065ec7943a48dcce0fcf8f7f3a89c24d940f201c7c73a3c97872a80ca25d1a3114fe16f225f4f55f3c6456cab8f0aa59d8efdc6939eb7f2b223ceff25db5222ff8e86c024229beec9ce765151d6e706fd60ab8ffe4c2e736eec4bcae53c1aaaef", 0x0, 0x0, 0x0, 0x10}}}, 0x120) openat$bsg(0xffffffffffffff9c, &(0x7f0000000700), 0x80001, 0x0) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) (async) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r1) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0), 0x106}}, 0x20) (async) openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) (async) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r5) (async) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000500)={0x9, 0x108, 0xfa00, {r4, 0x6, "d0f484", "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"}}, 0x110) (async) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r4}}, 0x10) (async) openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) (async) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r6) (async) syz_genetlink_get_family_id$devlink(&(0x7f0000000080), 0xffffffffffffffff) (async) sendmsg$DEVLINK_CMD_RATE_GET(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)=ANY=[@ANYBLOB='d\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="00012bbd7000ffdbdf254a0000000e0001edff000064657673696d0000000f0002006e657464657673696d3000000e00a80066697273746e616d650000000e0001006e657464657673696d0000000f0002006e657464657673696d300000"], 0x64}, 0x1, 0x0, 0x0, 0x24048084}, 0x0) (async) sendmsg$DEVLINK_CMD_PORT_UNSPLIT(r6, &(0x7f0000000380)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000340)={&(0x7f0000000640)=ANY=[@ANYBLOB="84000000", @ANYRES16=r7, @ANYBLOB="00012abd7000ffdbdf250a000000080001007063690011000200303030303a30303a31302e300000000008000300030000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008001b0000000000080001007063690011000200303030303a30303a31302e30000000000800030002000000"], 0x84}, 0x1, 0x0, 0x0, 0x4000}, 0x24044085) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000080)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x2, r4, 0x30, 0x1, @in6={0xa, 0x4e21, 0x91c, @loopback}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x10}}}, 0x120) (async) 14:44:50 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x40000, "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", 0x0, 0x0, 0x0, 0x3}}}, 0x120) [ 3597.587999][ T5564] RBP: 00007f9e8ccb31d0 R08: 0000000000000000 R09: 0000000000000000 [ 3597.596104][ T5564] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3597.604121][ T5564] R13: 00007ffe952cf46f R14: 00007f9e8ccb3300 R15: 0000000000022000 [ 3597.612088][ T5564] 14:44:50 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000700), 0x80001, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r1) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) (async) r5 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r5) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000500)={0x9, 0x108, 0xfa00, {r4, 0x6, "d0f484", "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"}}, 0x110) (async) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r4}}, 0x10) (async) r6 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r6) (async) r7 = syz_genetlink_get_family_id$devlink(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RATE_GET(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)=ANY=[@ANYBLOB='d\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="00012bbd7000ffdbdf254a0000000e0001edff000064657673696d0000000f0002006e657464657673696d3000000e00a80066697273746e616d650000000e0001006e657464657673696d0000000f0002006e657464657673696d300000"], 0x64}, 0x1, 0x0, 0x0, 0x24048084}, 0x0) (async) sendmsg$DEVLINK_CMD_PORT_UNSPLIT(r6, &(0x7f0000000380)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000340)={&(0x7f0000000640)=ANY=[@ANYBLOB="84000000", @ANYRES16=r7, @ANYBLOB="00012abd7000ffdbdf250a000000080001007063690011000200303030303a30303a31302e300000000008000300030000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008001b0000000000080001007063690011000200303030303a30303a31302e30000000000800030002000000"], 0x84}, 0x1, 0x0, 0x0, 0x4000}, 0x24044085) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000080)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x2, r4, 0x30, 0x1, @in6={0xa, 0x4e21, 0x91c, @loopback}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x10}}}, 0x120) 14:44:50 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "e0b3772264c43c79ea3709d20d36cc4637f10fb5de2d44e0a73f520c3612063189eaba7b99fa9556bcac2ba1fb34035db66efe1e7ea748d786f601d0dcc0875cb8313c7db8b6c64b414bd5a06373bc3fbdf80ab140bf4b8f6c4a991196664cd95bbff1abeb0e982cc9b17aac4b0381a35d7a53d098e99e432a3b2f69c8b9abd7356e7cc0700ff8a36c56bf3e8a01564cd35c263749dc7c61c59645ecda836dc9f9771ff0fcdeec9e4d22cc1722bacd35e0096e747dac83ef85aed84e433e8b13e27f70ad877ff1a53934e230ed382a6c4ff7a6c1d3bb2cee4b336dcd368e29a06ed88efe1806f129bfbdfccf6c5e3ba935eb8ad0af3928b311e0a1c89eca9c75"}}, 0x110) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x40000, "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", 0x0, 0x0, 0x0, 0x3}}}, 0x120) openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) (async) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x40000, "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", 0x0, 0x0, 0x0, 0x3}}}, 0x120) (async) 14:44:50 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x8010, r0, 0x0) 14:44:50 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "e0b3772264c43c79ea3709d20d36cc4637f10fb5de2d44e0a73f520c3612063189eaba7b99fa9556bcac2ba1fb34035db66efe1e7ea748d786f601d0dcc0875cb8313c7db8b6c64b414bd5a06373bc3fbdf80ab140bf4b8f6c4a991196664cd95bbff1abeb0e982cc9b17aac4b0381a35d7a53d098e99e432a3b2f69c8b9abd7356e7cc0700ff8a36c56bf3e8a01564cd35c263749dc7c61c59645ecda836dc9f9771ff0fcdeec9e4d22cc1722bacd35e0096e747dac83ef85aed84e433e8b13e27f70ad877ff1a53934e230ed382a6c4ff7a6c1d3bb2cee4b336dcd368e29a06ed88efe1806f129bfbdfccf6c5e3ba935eb8ad0af3928b311e0a1c89eca9c75"}}, 0x110) write$P9_RATTACH(r0, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x80, 0x1, 0x7}}, 0x14) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000080), 0xffffffffffffffff) prctl$PR_SET_SYSCALL_USER_DISPATCH_OFF(0x3b, 0x0) sendmsg$DEVLINK_CMD_RATE_GET(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x64, r1, 0x100, 0x70bd2b, 0x25dfdbff, {}, [@handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_RATE_NODE_NAME={0xe}, @handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}]}, 0x64}, 0x1, 0x0, 0x0, 0x24048084}, 0x0) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000080)={&(0x7f0000000740)=ANY=[@ANYBLOB="f8010000a635e544d06fedb8afb5dc09a95085064bec0a57da5c45707865034b22f6b76ce6", @ANYRES16=r1, @ANYBLOB="00042cbd7000fbdbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b00f7ffffff06001600000200000500120000000000080001007063690011000200303030303a30303a31302e3000000000080003000300000008000b000000000006001600500000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000600000006001600ff03000005001200000000000e0001006e657464657673696d0000000f0002006e657464657673696d300000080003000200000008000b000200000006001600020000000500120000000000080001007063690011000200303030303a30303a31302e3000000000080003000300000008000b000800000006001600000800000500120000000000080001007063690011000200303030303a30303a31302e3000000000080003000200000008000b007f00000006001600000000000500120000000000080001007063690011000200303030303a30303a31302e3000000000080003000200000008000b000500000006001600ff7f00000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000200000008000b000008000006001600e1ff00000500120000000000"], 0x1f8}, 0x1, 0x0, 0x0, 0x4}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) 14:44:50 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x20000260) (fail_nth: 58) 14:44:50 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x8010, r0, 0x0) openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) (async) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x8010, r0, 0x0) (async) 14:44:50 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) (async) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x40000, "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", 0x0, 0x0, 0x0, 0x3}}}, 0x120) [ 3597.852521][ T5620] FAULT_INJECTION: forcing a failure. [ 3597.852521][ T5620] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3597.865827][ T5620] CPU: 0 PID: 5620 Comm: syz-executor.0 Not tainted 5.17.0-rc2-syzkaller-00167-gdcb85f85fa6f-dirty #0 [ 3597.876767][ T5620] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3597.886902][ T5620] Call Trace: [ 3597.890200][ T5620] [ 3597.893126][ T5620] dump_stack_lvl+0xd6/0x122 [ 3597.897738][ T5620] dump_stack+0x11/0x1b [ 3597.901936][ T5620] should_fail+0x23c/0x250 [ 3597.906421][ T5620] __alloc_pages+0x102/0x330 [ 3597.911007][ T5620] alloc_pages_vma+0x67e/0x810 [ 3597.915771][ T5620] ? percpu_counter_add_batch+0x109/0x130 [ 3597.921492][ T5620] shmem_getpage_gfp+0x8b4/0x12c0 [ 3597.926523][ T5620] ? do_user_addr_fault+0x7d4/0xb90 [ 3597.931803][ T5620] shmem_write_begin+0x7e/0x100 [ 3597.936835][ T5620] generic_perform_write+0x1c8/0x400 [ 3597.942123][ T5620] ? shmem_write_begin+0x100/0x100 [ 3597.947317][ T5620] __generic_file_write_iter+0xf7/0x2b0 [ 3597.952932][ T5620] ? generic_write_checks+0x242/0x290 [ 3597.958304][ T5620] generic_file_write_iter+0x75/0x130 [ 3597.963712][ T5620] vfs_write+0x7f5/0x950 [ 3597.967958][ T5620] ksys_write+0xd9/0x190 [ 3597.972242][ T5620] __x64_sys_write+0x3e/0x50 [ 3597.976926][ T5620] do_syscall_64+0x44/0xd0 [ 3597.981344][ T5620] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3597.987238][ T5620] RIP: 0033:0x7f9e8db3d059 14:44:51 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x100000, 0x0, "13bd94e32c37a3932d8ad7271907f2903ccf3bb13b387d8fdf025cdf3c8faa37a970ea456fa2fd6f8354fc3b05088269a6d5b022e392b9bd78e5e2308e054c3e2cbb6e61b42c74f3c1ba8d63d10ed85dcc5d58071547cdfd9661f05024bcf8d7722e987a76fced66d3b33373d61da648b231fe3de6f7dc9a78420b7bf0a04efb660e06f2bf671a2060d09d80f7ee6ba3ae0b6edf87d14be34012ef95719e01f065ec7943a48dcce0fcf8f7f3a89c24d940f201c7c73a3c97872a80ca25d1a3114fe16f225f4f55f3c6456cab8f0aa59d8efdc6939eb7f2b223ceff25db5222ff8e86c024229beec9ce765151d6e706fd60ab8ffe4c2e736eec4bcae53c1aaaef"}}}, 0x20000260) 14:44:51 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) (async) write$P9_RATTACH(r0, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x80, 0x1, 0x7}}, 0x14) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000080), 0xffffffffffffffff) prctl$PR_SET_SYSCALL_USER_DISPATCH_OFF(0x3b, 0x0) (async) sendmsg$DEVLINK_CMD_RATE_GET(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x64, r1, 0x100, 0x70bd2b, 0x25dfdbff, {}, [@handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_RATE_NODE_NAME={0xe}, @handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}]}, 0x64}, 0x1, 0x0, 0x0, 0x24048084}, 0x0) (async) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000080)={&(0x7f0000000740)=ANY=[@ANYBLOB="f8010000a635e544d06fedb8afb5dc09a95085064bec0a57da5c45707865034b22f6b76ce6", @ANYRES16=r1, @ANYBLOB="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"], 0x1f8}, 0x1, 0x0, 0x0, 0x4}, 0x0) (async, rerun: 32) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (rerun: 32) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) 14:44:51 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x8010, r0, 0x0) openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) (async) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x8010, r0, 0x0) (async) 14:44:51 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x8, "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"}}}, 0x20000260) 14:44:51 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "e0b3772264c43c79ea3709d20d36cc4637f10fb5de2d44e0a73f520c3612063189eaba7b99fa9556bcac2ba1fb34035db66efe1e7ea748d786f601d0dcc0875cb8313c7db8b6c64b414bd5a06373bc3fbdbff1abeb0e982cc9b17aac4b0381a35d7a53d098e99e432a3b2f69c8b9abd7356e7cc0700ff8a36c56bf3e8a01564cd35c263749dc7c61c59645ecda836dc9f9771ff0fcdeec9e4d22cc1722bacd35e0096e747dac83ef85aed84e433e8b13e27f70ad877ff1a53934e230ed382a6c4ff7a6c1d3bb2cee4b336dcd368e29a06ed88efe1806f129bfbdfccf6c5e3ba935eb8ad0af3928b311e0a1c89eca9c7500"}}, 0x110) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) [ 3597.991648][ T5620] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 3598.011303][ T5620] RSP: 002b:00007f9e8ccb3168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3598.019752][ T5620] RAX: ffffffffffffffda RBX: 00007f9e8dc4ff60 RCX: 00007f9e8db3d059 [ 3598.027730][ T5620] RDX: 0000000020000260 RSI: 0000000020000140 RDI: 0000000000000003 [ 3598.035736][ T5620] RBP: 00007f9e8ccb31d0 R08: 0000000000000000 R09: 0000000000000000 [ 3598.043713][ T5620] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 14:44:51 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400001a}, 0xc, &(0x7f00000001c0)={&(0x7f0000000040)={0x164, 0x0, 0x400, 0x70bd2a, 0x25dfdbfd, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0x8e, 0x3}}, {@pci={{0x8}, {0x11}}, {0x8, 0x8e, 0x1}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x2}}, {@pci={{0x8}, {0x11}}, {0x8}}, {@pci={{0x8}, {0x11}}, {0x8, 0x8e, 0x1}}, {@pci={{0x8}, {0x11}}, {0x8, 0x8e, 0x2}}, {@pci={{0x8}, {0x11}}, {0x8, 0x8e, 0x1}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x2}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x2}}]}, 0x164}, 0x1, 0x0, 0x0, 0x20000014}, 0x4000) mmap$IORING_OFF_SQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x810, r0, 0x0) 14:44:51 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "e0b3772264c43c79ea3709d20d36cc4637f10fb5de2d44e0a73f520c3612063189eaba7b99fa9556bcac2ba1fb34035db66efe1e7ea748d786f601d0dcc0875cb8313c7db8b6c64b414bd5a06373bc3fbdbff1abeb0e982cc9b17aac4b0381a35d7a53d098e99e432a3b2f69c8b9abd7356e7cc0700ff8a36c56bf3e8a01564cd35c263749dc7c61c59645ecda836dc9f9771ff0fcdeec9e4d22cc1722bacd35e0096e747dac83ef85aed84e433e8b13e27f70ad877ff1a53934e230ed382a6c4ff7a6c1d3bb2cee4b336dcd368e29a06ed88efe1806f129bfbdfccf6c5e3ba935eb8ad0af3928b311e0a1c89eca9c7500"}}, 0x110) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "e0b3772264c43c79ea3709d20d36cc4637f10fb5de2d44e0a73f520c3612063189eaba7b99fa9556bcac2ba1fb34035db66efe1e7ea748d786f601d0dcc0875cb8313c7db8b6c64b414bd5a06373bc3fbdbff1abeb0e982cc9b17aac4b0381a35d7a53d098e99e432a3b2f69c8b9abd7356e7cc0700ff8a36c56bf3e8a01564cd35c263749dc7c61c59645ecda836dc9f9771ff0fcdeec9e4d22cc1722bacd35e0096e747dac83ef85aed84e433e8b13e27f70ad877ff1a53934e230ed382a6c4ff7a6c1d3bb2cee4b336dcd368e29a06ed88efe1806f129bfbdfccf6c5e3ba935eb8ad0af3928b311e0a1c89eca9c7500"}}, 0x110) (async) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) (async) 14:44:51 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$P9_RATTACH(r0, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x80, 0x1, 0x7}}, 0x14) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000080), 0xffffffffffffffff) prctl$PR_SET_SYSCALL_USER_DISPATCH_OFF(0x3b, 0x0) sendmsg$DEVLINK_CMD_RATE_GET(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x64, r1, 0x100, 0x70bd2b, 0x25dfdbff, {}, [@handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_RATE_NODE_NAME={0xe}, @handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}]}, 0x64}, 0x1, 0x0, 0x0, 0x24048084}, 0x0) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000080)={&(0x7f0000000740)=ANY=[@ANYBLOB="f8010000a635e544d06fedb8afb5dc09a95085064bec0a57da5c45707865034b22f6b76ce6", @ANYRES16=r1, @ANYBLOB="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"], 0x1f8}, 0x1, 0x0, 0x0, 0x4}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) (async) write$P9_RATTACH(r0, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x80, 0x1, 0x7}}, 0x14) (async) syz_genetlink_get_family_id$devlink(&(0x7f0000000080), 0xffffffffffffffff) (async) prctl$PR_SET_SYSCALL_USER_DISPATCH_OFF(0x3b, 0x0) (async) sendmsg$DEVLINK_CMD_RATE_GET(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x64, r1, 0x100, 0x70bd2b, 0x25dfdbff, {}, [@handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_RATE_NODE_NAME={0xe}, @handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}]}, 0x64}, 0x1, 0x0, 0x0, 0x24048084}, 0x0) (async) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000080)={&(0x7f0000000740)=ANY=[@ANYBLOB="f8010000a635e544d06fedb8afb5dc09a95085064bec0a57da5c45707865034b22f6b76ce6", @ANYRES16=r1, @ANYBLOB="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"], 0x1f8}, 0x1, 0x0, 0x0, 0x4}, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) (async) 14:44:51 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400001a}, 0xc, &(0x7f00000001c0)={&(0x7f0000000040)={0x164, 0x0, 0x400, 0x70bd2a, 0x25dfdbfd, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0x8e, 0x3}}, {@pci={{0x8}, {0x11}}, {0x8, 0x8e, 0x1}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x2}}, {@pci={{0x8}, {0x11}}, {0x8}}, {@pci={{0x8}, {0x11}}, {0x8, 0x8e, 0x1}}, {@pci={{0x8}, {0x11}}, {0x8, 0x8e, 0x2}}, {@pci={{0x8}, {0x11}}, {0x8, 0x8e, 0x1}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x2}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x2}}]}, 0x164}, 0x1, 0x0, 0x0, 0x20000014}, 0x4000) mmap$IORING_OFF_SQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x810, r0, 0x0) openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) (async) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400001a}, 0xc, &(0x7f00000001c0)={&(0x7f0000000040)={0x164, 0x0, 0x400, 0x70bd2a, 0x25dfdbfd, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0x8e, 0x3}}, {@pci={{0x8}, {0x11}}, {0x8, 0x8e, 0x1}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x2}}, {@pci={{0x8}, {0x11}}, {0x8}}, {@pci={{0x8}, {0x11}}, {0x8, 0x8e, 0x1}}, {@pci={{0x8}, {0x11}}, {0x8, 0x8e, 0x2}}, {@pci={{0x8}, {0x11}}, {0x8, 0x8e, 0x1}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x2}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x2}}]}, 0x164}, 0x1, 0x0, 0x0, 0x20000014}, 0x4000) (async) mmap$IORING_OFF_SQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x810, r0, 0x0) (async) 14:44:51 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x20000260) (fail_nth: 59) 14:44:51 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "e0b3772264c43c79ea3709d20d36cc4637f10fb5de2d44e0a73f520c3612063189eaba7b99fa9556bcac2ba1fb34035db66efe1e7ea748d786f601d0dcc0875cb8313c7db8b6c64b414bd5a06373bc3fbdbff1abeb0e982cc9b17aac4b0381a35d7a53d098e99e432a3b2f69c8b9abd7356e7cc0700ff8a36c56bf3e8a01564cd35c263749dc7c61c59645ecda836dc9f9771ff0fcdeec9e4d22cc1722bacd35e0096e747dac83ef85aed84e433e8b13e27f70ad877ff1a53934e230ed382a6c4ff7a6c1d3bb2cee4b336dcd368e29a06ed88efe1806f129bfbdfccf6c5e3ba935eb8ad0af3928b311e0a1c89eca9c7500"}}, 0x110) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "13bd94e32c37a3932d8ad7271907f2903ccf3bb13b387d8fdf025cdf3c8faa37a970ea456fa2fd6f8354fc3b05088269a6d5b022e392b9bd78e5e2308e054c3e2cbb6e61b42c74f3c1ba8d63d10ed85dcc5d58071547cdfd9661f05024bcf8d7722e987a76fced66d3b33373d61da648b231fe3de6f7dc9a78420b7bf0a04efb660e06f2bf671a2060d09d80f7ee6ba3ae0b6edf87d14be34012ef95719e01f065ec7943a48dcce0fcf8f7f3a89c24d940f201c7c73a3c97872a80ca25d1a3114fe16f225f4f55f3c6456cab8f0aa59d8efdc6939eb7f2b223ceff25db5222ff8e86c024229beec9ce765151d6e706fd60ab8ffe4c2e736eec4bcae53c1aaaef"}}}, 0x120) openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "e0b3772264c43c79ea3709d20d36cc4637f10fb5de2d44e0a73f520c3612063189eaba7b99fa9556bcac2ba1fb34035db66efe1e7ea748d786f601d0dcc0875cb8313c7db8b6c64b414bd5a06373bc3fbdbff1abeb0e982cc9b17aac4b0381a35d7a53d098e99e432a3b2f69c8b9abd7356e7cc0700ff8a36c56bf3e8a01564cd35c263749dc7c61c59645ecda836dc9f9771ff0fcdeec9e4d22cc1722bacd35e0096e747dac83ef85aed84e433e8b13e27f70ad877ff1a53934e230ed382a6c4ff7a6c1d3bb2cee4b336dcd368e29a06ed88efe1806f129bfbdfccf6c5e3ba935eb8ad0af3928b311e0a1c89eca9c7500"}}, 0x110) (async) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) (async) [ 3598.051706][ T5620] R13: 00007ffe952cf46f R14: 00007f9e8ccb3300 R15: 0000000000022000 [ 3598.059733][ T5620] 14:44:51 executing program 4: write$RDMA_USER_CM_CMD_REJECT(0xffffffffffffffff, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "e0b3772264c43c79ea3709d20d36cc4637f10fb5de2d44e0a73f520c3612063189eaba7b99fa9556bcac2ba1fb34035db66efe1e7ea748d786f601d0dcc0875cb8313c7db8b6c64b414bd5a06373bc3fbdf80ab140bf4b8f6c4a991196664cd95bbff1abeb0e982cc9b17aac4b0381a35d7a53d098e99e432a3b2f69c8b9abd7356e7cc0700ff8a36c56bf3e8a01564cd35c263749dc7c61c59645ecda836dc9f9771ff0fcdeec9e4d22cc1722bacd35e0096e747dac83ef85aed84e433e8b13e27f70ad877ff1a53934e230ed382a6c4ff7a6c1d3bb2cee4b336dcd368e29a06ed88efe1806f129bfbdfccf6c5e3ba935eb8ad0af3928b311e0a1c89eca9c75"}}, 0x110) syslog(0x2, &(0x7f0000000340)=""/16, 0x10) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) 14:44:51 executing program 4: write$RDMA_USER_CM_CMD_REJECT(0xffffffffffffffff, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) syslog(0x2, &(0x7f0000000340)=""/16, 0x10) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) [ 3598.116038][ T5652] FAULT_INJECTION: forcing a failure. [ 3598.116038][ T5652] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3598.129162][ T5652] CPU: 0 PID: 5652 Comm: syz-executor.0 Not tainted 5.17.0-rc2-syzkaller-00167-gdcb85f85fa6f-dirty #0 [ 3598.140123][ T5652] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3598.150178][ T5652] Call Trace: [ 3598.153503][ T5652] [ 3598.156468][ T5652] dump_stack_lvl+0xd6/0x122 [ 3598.161183][ T5652] dump_stack+0x11/0x1b 14:44:51 executing program 4: write$RDMA_USER_CM_CMD_REJECT(0xffffffffffffffff, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) syslog(0x2, &(0x7f0000000340)=""/16, 0x10) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "13bd94e32c37a3932d8ad7271907f2903ccf3bb13b387d8fdf025cdf3c8faa37a970ea456fa2fd6f8354fc3b05088269a6d5b022e392b9bd78e5e2308e054c3e2cbb6e61b42c74f3c1ba8d63d10ed85dcc5d58071547cdfd9661f05024bcf8d7722e987a76fced66d3b33373d61da648b231fe3de6f7dc9a78420b7bf0a04efb660e06f2bf671a2060d09d80f7ee6ba3ae0b6edf87d14be34012ef95719e01f065ec7943a48dcce0fcf8f7f3a89c24d940f201c7c73a3c97872a80ca25d1a3114fe16f225f4f55f3c6456cab8f0aa59d8efdc6939eb7f2b223ceff25db5222ff8e86c024229beec9ce765151d6e706fd60ab8ffe4c2e736eec4bcae53c1aaaef"}}}, 0x120) 14:44:51 executing program 4: write$RDMA_USER_CM_CMD_REJECT(0xffffffffffffffff, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) syslog(0x2, &(0x7f0000000340)=""/16, 0x10) [ 3598.165446][ T5652] should_fail+0x23c/0x250 [ 3598.169867][ T5652] should_fail_usercopy+0x16/0x20 [ 3598.174931][ T5652] copy_page_from_iter_atomic+0x2f1/0xcd0 [ 3598.180700][ T5652] ? shmem_write_begin+0x7e/0x100 [ 3598.185731][ T5652] generic_perform_write+0x211/0x400 [ 3598.191023][ T5652] ? shmem_write_begin+0x100/0x100 [ 3598.196203][ T5652] __generic_file_write_iter+0xf7/0x2b0 [ 3598.201747][ T5652] ? generic_write_checks+0x242/0x290 [ 3598.207120][ T5652] generic_file_write_iter+0x75/0x130 [ 3598.212492][ T5652] vfs_write+0x7f5/0x950 [ 3598.216735][ T5652] ksys_write+0xd9/0x190 [ 3598.220976][ T5652] __x64_sys_write+0x3e/0x50 [ 3598.225563][ T5652] do_syscall_64+0x44/0xd0 [ 3598.229980][ T5652] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3598.235951][ T5652] RIP: 0033:0x7f9e8db3d059 [ 3598.240361][ T5652] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 14:44:51 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0xc, "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"}}}, 0x20000260) 14:44:51 executing program 4: syslog(0x2, &(0x7f0000000340)=""/16, 0x10) 14:44:51 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={0xffffffffffffffff}, 0x4) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) 14:44:51 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400001a}, 0xc, &(0x7f00000001c0)={&(0x7f0000000040)={0x164, 0x0, 0x400, 0x70bd2a, 0x25dfdbfd, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0x8e, 0x3}}, {@pci={{0x8}, {0x11}}, {0x8, 0x8e, 0x1}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x2}}, {@pci={{0x8}, {0x11}}, {0x8}}, {@pci={{0x8}, {0x11}}, {0x8, 0x8e, 0x1}}, {@pci={{0x8}, {0x11}}, {0x8, 0x8e, 0x2}}, {@pci={{0x8}, {0x11}}, {0x8, 0x8e, 0x1}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x2}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x2}}]}, 0x164}, 0x1, 0x0, 0x0, 0x20000014}, 0x4000) (async) mmap$IORING_OFF_SQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x810, r0, 0x0) 14:44:51 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, &(0x7f0000000640)='*!!\x00', &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r3}}, 0x10) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000580)=[{0x7, 0x0, [0x1000, 0x9, 0x80000000, 0x0, 0x1, 0x8, 0x61c9096b, 0x5, 0x5, 0x0, 0x6, 0xe3be, 0x9, 0x1, 0x4, 0x1]}, {0x8, 0x0, [0x0, 0x0, 0x53df, 0x2, 0x483, 0x4, 0x7, 0x6, 0xfffffffc, 0x6, 0x1, 0x2, 0x2, 0x706, 0x1, 0x401]}], r3, 0x1, 0x1, 0x90}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "e0b3772264c43c79ea3709d20d36cc4637f10fb5de2d44e0a73f520c3612063189eaba7b99fa9556bcac2ba1fb34035db66efe1e7ea748d786f601d0dcc0875cb8313c7db8b6c64b414bd5a06373bc3fbdf80ab140bf4b8f6c4a991196664cd95bbff1abeb0e982cc9b17aac4b0381a35d7a53d098e99e432a3b2f69c8b9abd7356e7cc0700ff8a36c56bf3e8a01564cd35c263749dc7c61c59645ecda836dc9f9771ff0fcdeec9e4d22cc1722bacd35e0096e747dac83ef85aed84e433e8b13e27f70ad877ff1a53934e230ed382a6c4ff7a6c1d3bb2cee4b336dcd368e29a06ed88efe1806f129bfbdfccf6c5e3ba935eb8ad0af3928b311e0a1c89eca9c75"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x13f, 0x5}}, 0x20) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380), 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r2, &(0x7f0000000500)={0x12, 0x10, 0xfa00, {&(0x7f0000000000), r4, r5}}, 0x18) inotify_init() openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000540), 0x2, 0x0) [ 3598.260085][ T5652] RSP: 002b:00007f9e8ccb3168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3598.268500][ T5652] RAX: ffffffffffffffda RBX: 00007f9e8dc4ff60 RCX: 00007f9e8db3d059 [ 3598.276501][ T5652] RDX: 0000000020000260 RSI: 0000000020000140 RDI: 0000000000000003 [ 3598.284470][ T5652] RBP: 00007f9e8ccb31d0 R08: 0000000000000000 R09: 0000000000000000 [ 3598.292440][ T5652] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3598.300406][ T5652] R13: 00007ffe952cf46f R14: 00007f9e8ccb3300 R15: 0000000000022000 [ 3598.308453][ T5652] 14:44:51 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, &(0x7f0000000640)='*!!\x00', &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x0) (async) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r3}}, 0x10) (async, rerun: 64) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000580)=[{0x7, 0x0, [0x1000, 0x9, 0x80000000, 0x0, 0x1, 0x8, 0x61c9096b, 0x5, 0x5, 0x0, 0x6, 0xe3be, 0x9, 0x1, 0x4, 0x1]}, {0x8, 0x0, [0x0, 0x0, 0x53df, 0x2, 0x483, 0x4, 0x7, 0x6, 0xfffffffc, 0x6, 0x1, 0x2, 0x2, 0x706, 0x1, 0x401]}], r3, 0x1, 0x1, 0x90}}, 0x20) (rerun: 64) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "e0b3772264c43c79ea3709d20d36cc4637f10fb5de2d44e0a73f520c3612063189eaba7b99fa9556bcac2ba1fb34035db66efe1e7ea748d786f601d0dcc0875cb8313c7db8b6c64b414bd5a06373bc3fbdf80ab140bf4b8f6c4a991196664cd95bbff1abeb0e982cc9b17aac4b0381a35d7a53d098e99e432a3b2f69c8b9abd7356e7cc0700ff8a36c56bf3e8a01564cd35c263749dc7c61c59645ecda836dc9f9771ff0fcdeec9e4d22cc1722bacd35e0096e747dac83ef85aed84e433e8b13e27f70ad877ff1a53934e230ed382a6c4ff7a6c1d3bb2cee4b336dcd368e29a06ed88efe1806f129bfbdfccf6c5e3ba935eb8ad0af3928b311e0a1c89eca9c75"}}, 0x110) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "13bd94e32c37a3932d8ad7271907f2903ccf3bb13b387d8fdf025cdf3c8faa37a970ea456fa2fd6f8354fc3b05088269a6d5b022e392b9bd78e5e2308e054c3e2cbb6e61b42c74f3c1ba8d63d10ed85dcc5d58071547cdfd9661f05024bcf8d7722e987a76fced66d3b33373d61da648b231fe3de6f7dc9a78420b7bf0a04efb660e06f2bf671a2060d09d80f7ee6ba3ae0b6edf87d14be34012ef95719e01f065ec7943a48dcce0fcf8f7f3a89c24d940f201c7c73a3c97872a80ca25d1a3114fe16f225f4f55f3c6456cab8f0aa59d8efdc6939eb7f2b223ceff25db5222ff8e86c024229beec9ce765151d6e706fd60ab8ffe4c2e736eec4bcae53c1aaaef"}}}, 0x120) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x13f, 0x5}}, 0x20) (async, rerun: 32) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380), 0x2, 0x0) (rerun: 32) write$RDMA_USER_CM_CMD_MIGRATE_ID(r2, &(0x7f0000000500)={0x12, 0x10, 0xfa00, {&(0x7f0000000000), r4, r5}}, 0x18) (async, rerun: 32) inotify_init() (async, rerun: 32) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000540), 0x2, 0x0) [ 3598.380127][ T5652] ================================================================== [ 3598.388244][ T5652] BUG: KCSAN: data-race in __percpu_counter_compare / percpu_counter_add_batch [ 3598.397186][ T5652] [ 3598.399505][ T5652] write to 0xffff888100876f10 of 8 bytes by task 5684 on cpu 1: [ 3598.407124][ T5652] percpu_counter_add_batch+0xb4/0x130 [ 3598.412722][ T5652] shmem_getpage_gfp+0x828/0x12c0 [ 3598.417752][ T5652] shmem_write_begin+0x7e/0x100 [ 3598.422609][ T5652] generic_perform_write+0x1c8/0x400 [ 3598.427886][ T5652] __generic_file_write_iter+0xf7/0x2b0 [ 3598.433421][ T5652] generic_file_write_iter+0x75/0x130 [ 3598.438784][ T5652] vfs_write+0x7f5/0x950 [ 3598.443018][ T5652] ksys_write+0xd9/0x190 [ 3598.447258][ T5652] __x64_sys_write+0x3e/0x50 [ 3598.451853][ T5652] do_syscall_64+0x44/0xd0 [ 3598.456265][ T5652] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3598.462159][ T5652] [ 3598.464476][ T5652] read to 0xffff888100876f10 of 8 bytes by task 5652 on cpu 0: [ 3598.472009][ T5652] __percpu_counter_compare+0x28/0x1a0 [ 3598.477462][ T5652] shmem_getpage_gfp+0x7b7/0x12c0 [ 3598.482486][ T5652] shmem_write_begin+0x7e/0x100 [ 3598.487347][ T5652] generic_perform_write+0x1c8/0x400 [ 3598.492636][ T5652] __generic_file_write_iter+0xf7/0x2b0 [ 3598.498180][ T5652] generic_file_write_iter+0x75/0x130 [ 3598.503530][ T5652] vfs_write+0x7f5/0x950 [ 3598.507750][ T5652] ksys_write+0xd9/0x190 [ 3598.511983][ T5652] __x64_sys_write+0x3e/0x50 [ 3598.516564][ T5652] do_syscall_64+0x44/0xd0 [ 3598.520957][ T5652] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3598.526828][ T5652] [ 3598.529134][ T5652] value changed: 0x00000000000009fb -> 0x0000000000000a1b [ 3598.536214][ T5652] [ 3598.538512][ T5652] Reported by Kernel Concurrency Sanitizer on: [ 3598.544633][ T5652] CPU: 0 PID: 5652 Comm: syz-executor.0 Not tainted 5.17.0-rc2-syzkaller-00167-gdcb85f85fa6f-dirty #0 [ 3598.555546][ T5652] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3598.565598][ T5652] ================================================================== 14:44:51 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x20000260) (fail_nth: 60) 14:44:51 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={0xffffffffffffffff}, 0x4) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) (async) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={0xffffffffffffffff}, 0x4) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) (async) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "13bd94e32c37a3932d8ad7271907f2903ccf3bb13b387d8fdf025cdf3c8faa37a970ea456fa2fd6f8354fc3b05088269a6d5b022e392b9bd78e5e2308e054c3e2cbb6e61b42c74f3c1ba8d63d10ed85dcc5d58071547cdfd9661f05024bcf8d7722e987a76fced66d3b33373d61da648b231fe3de6f7dc9a78420b7bf0a04efb660e06f2bf671a2060d09d80f7ee6ba3ae0b6edf87d14be34012ef95719e01f065ec7943a48dcce0fcf8f7f3a89c24d940f201c7c73a3c97872a80ca25d1a3114fe16f225f4f55f3c6456cab8f0aa59d8efdc6939eb7f2b223ceff25db5222ff8e86c024229beec9ce765151d6e706fd60ab8ffe4c2e736eec4bcae53c1aaaef"}}}, 0x120) (async) 14:44:51 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0x0) 14:44:51 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, &(0x7f0000000640)='*!!\x00', &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r3}}, 0x10) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000580)=[{0x7, 0x0, [0x1000, 0x9, 0x80000000, 0x0, 0x1, 0x8, 0x61c9096b, 0x5, 0x5, 0x0, 0x6, 0xe3be, 0x9, 0x1, 0x4, 0x1]}, {0x8, 0x0, [0x0, 0x0, 0x53df, 0x2, 0x483, 0x4, 0x7, 0x6, 0xfffffffc, 0x6, 0x1, 0x2, 0x2, 0x706, 0x1, 0x401]}], r3, 0x1, 0x1, 0x90}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "e0b3772264c43c79ea3709d20d36cc4637f10fb5de2d44e0a73f520c3612063189eaba7b99fa9556bcac2ba1fb34035db66efe1e7ea748d786f601d0dcc0875cb8313c7db8b6c64b414bd5a06373bc3fbdf80ab140bf4b8f6c4a991196664cd95bbff1abeb0e982cc9b17aac4b0381a35d7a53d098e99e432a3b2f69c8b9abd7356e7cc0700ff8a36c56bf3e8a01564cd35c263749dc7c61c59645ecda836dc9f9771ff0fcdeec9e4d22cc1722bacd35e0096e747dac83ef85aed84e433e8b13e27f70ad877ff1a53934e230ed382a6c4ff7a6c1d3bb2cee4b336dcd368e29a06ed88efe1806f129bfbdfccf6c5e3ba935eb8ad0af3928b311e0a1c89eca9c75"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x13f, 0x5}}, 0x20) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380), 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r2, &(0x7f0000000500)={0x12, 0x10, 0xfa00, {&(0x7f0000000000), r4, r5}}, 0x18) inotify_init() openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000540), 0x2, 0x0) openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) (async) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, &(0x7f0000000640)='*!!\x00', &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r3}}, 0x10) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000580)=[{0x7, 0x0, [0x1000, 0x9, 0x80000000, 0x0, 0x1, 0x8, 0x61c9096b, 0x5, 0x5, 0x0, 0x6, 0xe3be, 0x9, 0x1, 0x4, 0x1]}, {0x8, 0x0, [0x0, 0x0, 0x53df, 0x2, 0x483, 0x4, 0x7, 0x6, 0xfffffffc, 0x6, 0x1, 0x2, 0x2, 0x706, 0x1, 0x401]}], r3, 0x1, 0x1, 0x90}}, 0x20) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300), 0x13f, 0x5}}, 0x20) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_MIGRATE_ID(r2, &(0x7f0000000500)={0x12, 0x10, 0xfa00, {&(0x7f0000000000), r4, r5}}, 0x18) (async) inotify_init() (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000540), 0x2, 0x0) (async) 14:44:51 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x10, "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"}}}, 0x20000260) 14:44:51 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0x0) 14:44:51 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={0xffffffffffffffff}, 0x4) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) (async) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={0xffffffffffffffff}, 0x4) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) (async) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) (async) [ 3598.644512][ T5687] FAULT_INJECTION: forcing a failure. [ 3598.644512][ T5687] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3598.657862][ T5687] CPU: 0 PID: 5687 Comm: syz-executor.0 Not tainted 5.17.0-rc2-syzkaller-00167-gdcb85f85fa6f-dirty #0 [ 3598.668914][ T5687] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3598.678968][ T5687] Call Trace: [ 3598.682242][ T5687] [ 3598.685229][ T5687] dump_stack_lvl+0xd6/0x122 [ 3598.689825][ T5687] dump_stack+0x11/0x1b [ 3598.694036][ T5687] should_fail+0x23c/0x250 [ 3598.698515][ T5687] __alloc_pages+0x102/0x330 [ 3598.703111][ T5687] alloc_pages_vma+0x67e/0x810 [ 3598.707880][ T5687] ? percpu_counter_add_batch+0x109/0x130 [ 3598.713605][ T5687] shmem_getpage_gfp+0x8b4/0x12c0 [ 3598.718655][ T5687] ? do_user_addr_fault+0x7d4/0xb90 [ 3598.723864][ T5687] shmem_write_begin+0x7e/0x100 [ 3598.728729][ T5687] generic_perform_write+0x1c8/0x400 [ 3598.734131][ T5687] ? shmem_write_begin+0x100/0x100 [ 3598.739243][ T5687] __generic_file_write_iter+0xf7/0x2b0 [ 3598.744807][ T5687] ? generic_write_checks+0x242/0x290 [ 3598.750181][ T5687] generic_file_write_iter+0x75/0x130 [ 3598.755552][ T5687] vfs_write+0x7f5/0x950 [ 3598.759793][ T5687] ksys_write+0xd9/0x190 [ 3598.764050][ T5687] __x64_sys_write+0x3e/0x50 [ 3598.768642][ T5687] do_syscall_64+0x44/0xd0 [ 3598.773059][ T5687] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3598.778976][ T5687] RIP: 0033:0x7f9e8db3d059 [ 3598.783384][ T5687] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 3598.803049][ T5687] RSP: 002b:00007f9e8ccb3168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3598.811536][ T5687] RAX: ffffffffffffffda RBX: 00007f9e8dc4ff60 RCX: 00007f9e8db3d059 [ 3598.819503][ T5687] RDX: 0000000020000260 RSI: 0000000020000140 RDI: 0000000000000003 [ 3598.827480][ T5687] RBP: 00007f9e8ccb31d0 R08: 0000000000000000 R09: 0000000000000000 [ 3598.835449][ T5687] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 14:44:51 executing program 4: syslog(0x2, &(0x7f0000000340)=""/16, 0x10) 14:44:51 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0x0) 14:44:51 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) r1 = io_uring_setup(0x5e14, &(0x7f0000000000)={0x0, 0x8fdd, 0x37, 0x3, 0x0, 0x0, r0}) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r2) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(r1, 0x7, &(0x7f0000000080)=r2, 0x1) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) 14:44:51 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000080), 0x34000, 0x0) io_uring_register$IORING_REGISTER_PROBE(r1, 0x8, &(0x7f0000000500)={0x0, 0x0, 0x0, '\x00', [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, 0x25) openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0), 0x2c0402, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x40000, 0x0) io_uring_register$IORING_UNREGISTER_EVENTFD(r2, 0x5, 0x0, 0x0) 14:44:51 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x204, "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"}}}, 0x20000260) 14:44:52 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x20000260) (fail_nth: 61) 14:44:52 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x2c40c0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0x0) 14:44:52 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) r1 = io_uring_setup(0x5e14, &(0x7f0000000000)={0x0, 0x8fdd, 0x37, 0x3, 0x0, 0x0, r0}) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r2) (async) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(r1, 0x7, &(0x7f0000000080)=r2, 0x1) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) (async) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "13bd94e32c37a3932d8ad7271907f2903ccf3bb13b387d8fdf025cdf3c8faa37a970ea456fa2fd6f8354fc3b05088269a6d5b022e392b9bd78e5e2308e054c3e2cbb6e61b42c74f3c1ba8d63d10ed85dcc5d58071547cdfd9661f05024bcf8d7722e987a76fced66d3b33373d61da648b231fe3de6f7dc9a78420b7bf0a04efb660e06f2bf671a2060d09d80f7ee6ba3ae0b6edf87d14be34012ef95719e01f065ec7943a48dcce0fcf8f7f3a89c24d940f201c7c73a3c97872a80ca25d1a3114fe16f225f4f55f3c6456cab8f0aa59d8efdc6939eb7f2b223ceff25db5222ff8e86c024229beec9ce765151d6e706fd60ab8ffe4c2e736eec4bcae53c1aaaef"}}}, 0x120) 14:44:52 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000080), 0x34000, 0x0) io_uring_register$IORING_REGISTER_PROBE(r1, 0x8, &(0x7f0000000500)={0x0, 0x0, 0x0, '\x00', [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, 0x25) openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0), 0x2c0402, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "13bd94e32c37a3932d8ad7271907f2903ccf3bb13b387d8fdf025cdf3c8faa37a970ea456fa2fd6f8354fc3b05088269a6d5b022e392b9bd78e5e2308e054c3e2cbb6e61b42c74f3c1ba8d63d10ed85dcc5d58071547cdfd9661f05024bcf8d7722e987a76fced66d3b33373d61da648b231fe3de6f7dc9a78420b7bf0a04efb660e06f2bf671a2060d09d80f7ee6ba3ae0b6edf87d14be34012ef95719e01f065ec7943a48dcce0fcf8f7f3a89c24d940f201c7c73a3c97872a80ca25d1a3114fe16f225f4f55f3c6456cab8f0aa59d8efdc6939eb7f2b223ceff25db5222ff8e86c024229beec9ce765151d6e706fd60ab8ffe4c2e736eec4bcae53c1aaaef"}}}, 0x120) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x40000, 0x0) io_uring_register$IORING_UNREGISTER_EVENTFD(r2, 0x5, 0x0, 0x0) openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) openat$null(0xffffffffffffff9c, &(0x7f0000000080), 0x34000, 0x0) (async) io_uring_register$IORING_REGISTER_PROBE(r1, 0x8, &(0x7f0000000500)={0x0, 0x0, 0x0, '\x00', [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, 0x25) (async) openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0), 0x2c0402, 0x0) (async) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) (async) openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x40000, 0x0) (async) io_uring_register$IORING_UNREGISTER_EVENTFD(r2, 0x5, 0x0, 0x0) (async) [ 3598.843540][ T5687] R13: 00007ffe952cf46f R14: 00007f9e8ccb3300 R15: 0000000000022000 [ 3598.851572][ T5687] 14:44:52 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) r1 = io_uring_setup(0x5e14, &(0x7f0000000000)={0x0, 0x8fdd, 0x37, 0x3, 0x0, 0x0, r0}) (async) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r2) (async) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(r1, 0x7, &(0x7f0000000080)=r2, 0x1) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) (async) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) 14:44:52 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x2c40c0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0x0) [ 3598.921943][ T5737] FAULT_INJECTION: forcing a failure. [ 3598.921943][ T5737] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3598.935102][ T5737] CPU: 0 PID: 5737 Comm: syz-executor.0 Not tainted 5.17.0-rc2-syzkaller-00167-gdcb85f85fa6f-dirty #0 [ 3598.946063][ T5737] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3598.956180][ T5737] Call Trace: [ 3598.959451][ T5737] [ 3598.962435][ T5737] dump_stack_lvl+0xd6/0x122 [ 3598.967088][ T5737] dump_stack+0x11/0x1b 14:44:52 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x2c40c0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0x0) [ 3598.971241][ T5737] should_fail+0x23c/0x250 [ 3598.975664][ T5737] should_fail_usercopy+0x16/0x20 [ 3598.980741][ T5737] copy_page_from_iter_atomic+0x2f1/0xcd0 [ 3598.986508][ T5737] ? shmem_write_begin+0x7e/0x100 [ 3598.991662][ T5737] generic_perform_write+0x211/0x400 [ 3598.996954][ T5737] ? shmem_write_begin+0x100/0x100 [ 3599.002143][ T5737] __generic_file_write_iter+0xf7/0x2b0 [ 3599.007689][ T5737] ? generic_write_checks+0x242/0x290 [ 3599.013065][ T5737] generic_file_write_iter+0x75/0x130 [ 3599.018436][ T5737] vfs_write+0x7f5/0x950 [ 3599.022676][ T5737] ksys_write+0xd9/0x190 [ 3599.026914][ T5737] __x64_sys_write+0x3e/0x50 [ 3599.031525][ T5737] do_syscall_64+0x44/0xd0 [ 3599.035937][ T5737] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3599.041833][ T5737] RIP: 0033:0x7f9e8db3d059 [ 3599.046243][ T5737] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 14:44:52 executing program 4: syslog(0x2, &(0x7f0000000340)=""/16, 0x10) 14:44:52 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000080), 0x34000, 0x0) io_uring_register$IORING_REGISTER_PROBE(r1, 0x8, &(0x7f0000000500)={0x0, 0x0, 0x0, '\x00', [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, 0x25) openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0), 0x2c0402, 0x0) (async) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "13bd94e32c37a3932d8ad7271907f2903ccf3bb13b387d8fdf025cdf3c8faa37a970ea456fa2fd6f8354fc3b05088269a6d5b022e392b9bd78e5e2308e054c3e2cbb6e61b42c74f3c1ba8d63d10ed85dcc5d58071547cdfd9661f05024bcf8d7722e987a76fced66d3b33373d61da648b231fe3de6f7dc9a78420b7bf0a04efb660e06f2bf671a2060d09d80f7ee6ba3ae0b6edf87d14be34012ef95719e01f065ec7943a48dcce0fcf8f7f3a89c24d940f201c7c73a3c97872a80ca25d1a3114fe16f225f4f55f3c6456cab8f0aa59d8efdc6939eb7f2b223ceff25db5222ff8e86c024229beec9ce765151d6e706fd60ab8ffe4c2e736eec4bcae53c1aaaef"}}}, 0x120) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x40000, 0x0) io_uring_register$IORING_UNREGISTER_EVENTFD(r2, 0x5, 0x0, 0x0) 14:44:52 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) r1 = inotify_init() inotify_rm_watch(r1, 0x0) inotify_add_watch(r1, &(0x7f0000000000)='./file0\x00', 0x984) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "13bd94e32c37a3932d8ad7271907f2903ccf3bb13b387d8fdf025cdf3c8faa37a970ea456fa2fd6f8354fc3b05088269a6d5b022e392b9bd78e5e2308e054c3e2cbb6e61b42c74f3c1ba8d63d10ed85dcc5d58071547cdfd9661f05024bcf8d7722e987a76fced66d3b33373d61da648b231fe3de6f7dc9a78420b7bf0a04efb660e06f2bf671a2060d09d80f7ee6ba3ae0b6edf87d14be34012ef95719e01f065ec7943a48dcce0fcf8f7f3a89c24d940f201c7c73a3c97872a80ca25d1a3114fe16f225f4f55f3c6456cab8f0aa59d8efdc6939eb7f2b223ceff25db5222ff8e86c024229beec9ce765151d6e706fd60ab8ffe4c2e736eec4bcae53c1aaaef"}}}, 0x120) 14:44:52 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x300, "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"}}}, 0x20000260) 14:44:52 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x111001, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0x0) [ 3599.065919][ T5737] RSP: 002b:00007f9e8ccb3168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3599.074336][ T5737] RAX: ffffffffffffffda RBX: 00007f9e8dc4ff60 RCX: 00007f9e8db3d059 [ 3599.082290][ T5737] RDX: 0000000020000260 RSI: 0000000020000140 RDI: 0000000000000003 [ 3599.090239][ T5737] RBP: 00007f9e8ccb31d0 R08: 0000000000000000 R09: 0000000000000000 [ 3599.098260][ T5737] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3599.106250][ T5737] R13: 00007ffe952cf46f R14: 00007f9e8ccb3300 R15: 0000000000022000 [ 3599.114342][ T5737] 14:44:52 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x20000260) (fail_nth: 62) 14:44:52 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) (async) r1 = inotify_init() inotify_rm_watch(r1, 0x0) inotify_add_watch(r1, &(0x7f0000000000)='./file0\x00', 0x984) (async) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) 14:44:52 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x2c080, 0x0) sendmsg$DEVLINK_CMD_SB_PORT_POOL_SET(r0, &(0x7f0000000100)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000000c0)={&(0x7f0000000300)={0x94, 0x0, 0x8, 0x70bd25, 0x25dfdbff, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x8}, {0x6, 0x11, 0x5}, {0x8, 0x15, 0x80000001}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}, {0x8, 0xb, 0x32}, {0x6, 0x11, 0x3}, {0x8, 0x15, 0x80000000}}]}, 0x94}, 0x1, 0x0, 0x0, 0x85}, 0x804) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) 14:44:52 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x111001, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0x0) 14:44:52 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x111001, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0x0) 14:44:52 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) r1 = inotify_init() inotify_rm_watch(r1, 0x0) (async) inotify_add_watch(r1, &(0x7f0000000000)='./file0\x00', 0x984) (async) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "13bd94e32c37a3932d8ad7271907f2903ccf3bb13b387d8fdf025cdf3c8faa37a970ea456fa2fd6f8354fc3b05088269a6d5b022e392b9bd78e5e2308e054c3e2cbb6e61b42c74f3c1ba8d63d10ed85dcc5d58071547cdfd9661f05024bcf8d7722e987a76fced66d3b33373d61da648b231fe3de6f7dc9a78420b7bf0a04efb660e06f2bf671a2060d09d80f7ee6ba3ae0b6edf87d14be34012ef95719e01f065ec7943a48dcce0fcf8f7f3a89c24d940f201c7c73a3c97872a80ca25d1a3114fe16f225f4f55f3c6456cab8f0aa59d8efdc6939eb7f2b223ceff25db5222ff8e86c024229beec9ce765151d6e706fd60ab8ffe4c2e736eec4bcae53c1aaaef"}}}, 0x120) 14:44:52 executing program 5: r0 = inotify_init() inotify_rm_watch(r0, 0x0) r1 = inotify_init() inotify_rm_watch(r1, 0x0) r2 = socket$can_bcm(0x1d, 0x2, 0x2) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x40, 0x0, &(0x7f0000000000)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2]}, 0x9) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000080), 0x241800, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x10, r3, 0x0) [ 3599.296064][ T5782] FAULT_INJECTION: forcing a failure. [ 3599.296064][ T5782] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3599.309344][ T5782] CPU: 1 PID: 5782 Comm: syz-executor.0 Not tainted 5.17.0-rc2-syzkaller-00167-gdcb85f85fa6f-dirty #0 [ 3599.320382][ T5782] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3599.330445][ T5782] Call Trace: [ 3599.333712][ T5782] [ 3599.336666][ T5782] dump_stack_lvl+0xd6/0x122 [ 3599.341239][ T5782] dump_stack+0x11/0x1b [ 3599.345389][ T5782] should_fail+0x23c/0x250 [ 3599.349825][ T5782] __alloc_pages+0x102/0x330 [ 3599.354425][ T5782] alloc_pages_vma+0x67e/0x810 [ 3599.359200][ T5782] ? _raw_spin_unlock_irqrestore+0x3d/0x60 [ 3599.365018][ T5782] ? percpu_counter_add_batch+0x109/0x130 [ 3599.370868][ T5782] shmem_getpage_gfp+0x8b4/0x12c0 [ 3599.375895][ T5782] ? do_user_addr_fault+0x7d4/0xb90 [ 3599.381108][ T5782] shmem_write_begin+0x7e/0x100 [ 3599.385981][ T5782] generic_perform_write+0x1c8/0x400 [ 3599.391247][ T5782] ? shmem_write_begin+0x100/0x100 [ 3599.396399][ T5782] __generic_file_write_iter+0xf7/0x2b0 [ 3599.402021][ T5782] ? generic_write_checks+0x242/0x290 [ 3599.407397][ T5782] generic_file_write_iter+0x75/0x130 [ 3599.412758][ T5782] vfs_write+0x7f5/0x950 [ 3599.416983][ T5782] ksys_write+0xd9/0x190 [ 3599.421208][ T5782] __x64_sys_write+0x3e/0x50 [ 3599.425787][ T5782] do_syscall_64+0x44/0xd0 [ 3599.430190][ T5782] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3599.436064][ T5782] RIP: 0033:0x7f9e8db3d059 [ 3599.440464][ T5782] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 3599.460155][ T5782] RSP: 002b:00007f9e8ccb3168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3599.468564][ T5782] RAX: ffffffffffffffda RBX: 00007f9e8dc4ff60 RCX: 00007f9e8db3d059 [ 3599.476523][ T5782] RDX: 0000000020000260 RSI: 0000000020000140 RDI: 0000000000000003 [ 3599.484473][ T5782] RBP: 00007f9e8ccb31d0 R08: 0000000000000000 R09: 0000000000000000 14:44:52 executing program 4: write$RDMA_USER_CM_CMD_REJECT(0xffffffffffffffff, 0x0, 0x0) syslog(0x2, &(0x7f0000000340)=""/16, 0x10) 14:44:52 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x2c080, 0x0) sendmsg$DEVLINK_CMD_SB_PORT_POOL_SET(r0, &(0x7f0000000100)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000000c0)={&(0x7f0000000300)={0x94, 0x0, 0x8, 0x70bd25, 0x25dfdbff, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x8}, {0x6, 0x11, 0x5}, {0x8, 0x15, 0x80000001}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}, {0x8, 0xb, 0x32}, {0x6, 0x11, 0x3}, {0x8, 0x15, 0x80000000}}]}, 0x94}, 0x1, 0x0, 0x0, 0x85}, 0x804) (async) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "13bd94e32c37a3932d8ad7271907f2903ccf3bb13b387d8fdf025cdf3c8faa37a970ea456fa2fd6f8354fc3b05088269a6d5b022e392b9bd78e5e2308e054c3e2cbb6e61b42c74f3c1ba8d63d10ed85dcc5d58071547cdfd9661f05024bcf8d7722e987a76fced66d3b33373d61da648b231fe3de6f7dc9a78420b7bf0a04efb660e06f2bf671a2060d09d80f7ee6ba3ae0b6edf87d14be34012ef95719e01f065ec7943a48dcce0fcf8f7f3a89c24d940f201c7c73a3c97872a80ca25d1a3114fe16f225f4f55f3c6456cab8f0aa59d8efdc6939eb7f2b223ceff25db5222ff8e86c024229beec9ce765151d6e706fd60ab8ffe4c2e736eec4bcae53c1aaaef"}}}, 0x120) 14:44:52 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r3}}, 0x10) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r4) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r4, &(0x7f0000000000)={0x5, 0x10, 0xfa00, {&(0x7f0000000500), r3, 0x2}}, 0x18) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000a40)={0x6, 0x118, 0xfa00, {{0x2, 0x80, "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", 0x81, 0x0, 0x8, 0xfc, 0x5, 0x0, 0x1, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {r3, 0x4, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x5, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0xff}}}, 0x120) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000880)=ANY=[@ANYBLOB="018dff000100000018000019", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES16=r2, @ANYBLOB="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", @ANYRESDEC=r4, @ANYRES16=r2]) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r0, &(0x7f0000000380)={&(0x7f0000000b80)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000340)={&(0x7f0000000700)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="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"], 0x144}, 0x1, 0x0, 0x0, 0x20000850}, 0x0) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r7, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r8}}, 0x10) write$RDMA_USER_CM_CMD_NOTIFY(r5, &(0x7f0000000280)={0xf, 0x8, 0xfa00, {r8, 0xf}}, 0x10) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000080)={0xffffffffffffffff}, 0x1, {0xa, 0x4e23, 0x8, @empty, 0x2}}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, &(0x7f0000000100)={0x11, 0x10, 0xfa00, {&(0x7f0000000040), r9}}, 0x18) 14:44:52 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x402, "13bd94e32c37a3932d8ad7271907f2903ccf3bb13b387d8fdf025cdf3c8faa37a970ea456fa2fd6f8354fc3b05088269a6d5b022e392b9bd78e5e2308e054c3e2cbb6e61b42c74f3c1ba8d63d10ed85dcc5d58071547cdfd9661f05024bcf8d7722e987a76fced66d3b33373d61da648b231fe3de6f7dc9a78420b7bf0a04efb660e06f2bf671a2060d09d80f7ee6ba3ae0b6edf87d14be34012ef95719e01f065ec7943a48dcce0fcf8f7f3a89c24d940f201c7c73a3c97872a80ca25d1a3114fe16f225f4f55f3c6456cab8f0aa59d8efdc6939eb7f2b223ceff25db5222ff8e86c024229beec9ce765151d6e706fd60ab8ffe4c2e736eec4bcae53c1aaaef"}}}, 0x20000260) 14:44:52 executing program 5: r0 = inotify_init() inotify_rm_watch(r0, 0x0) r1 = inotify_init() inotify_rm_watch(r1, 0x0) r2 = socket$can_bcm(0x1d, 0x2, 0x2) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x40, 0x0, &(0x7f0000000000)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2]}, 0x9) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000080), 0x241800, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x10, r3, 0x0) inotify_init() (async) inotify_rm_watch(r0, 0x0) (async) inotify_init() (async) inotify_rm_watch(r1, 0x0) (async) socket$can_bcm(0x1d, 0x2, 0x2) (async) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x40, 0x0, &(0x7f0000000000)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2]}, 0x9) (async) openat$bsg(0xffffffffffffff9c, &(0x7f0000000080), 0x241800, 0x0) (async) mmap$IORING_OFF_SQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x10, r3, 0x0) (async) 14:44:52 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "13bd94e32c37a3932d8ad7271907f2903ccf3bb13b387d8fdf025cdf3c8faa37a970ea456fa2fd6f8354fc3b05088269a6d5b022e392b9bd78e5e2308e054c3e2cbb6e61b42c74f3c1ba8d63d10ed85dcc5d58071547cdfd9661f05024bcf8d7722e987a76fced66d3b33373d61da648b231fe3de6f7dc9a78420b7bf0a04efb660e06f2bf671a2060d09d80f7ee6ba3ae0b6edf87d14be34012ef95719e01f065ec7943a48dcce0fcf8f7f3a89c24d940f201c7c73a3c97872a80ca25d1a3114fe16f225f4f55f3c6456cab8f0aa59d8efdc6939eb7f2b223ceff25db5222ff8e86c024229beec9ce765151d6e706fd60ab8ffe4c2e736eec4bcae53c1aaaef"}}}, 0x20000260) (fail_nth: 63) 14:44:52 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x2c080, 0x0) sendmsg$DEVLINK_CMD_SB_PORT_POOL_SET(r0, &(0x7f0000000100)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000000c0)={&(0x7f0000000300)={0x94, 0x0, 0x8, 0x70bd25, 0x25dfdbff, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x8}, {0x6, 0x11, 0x5}, {0x8, 0x15, 0x80000001}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}, {0x8, 0xb, 0x32}, {0x6, 0x11, 0x3}, {0x8, 0x15, 0x80000000}}]}, 0x94}, 0x1, 0x0, 0x0, 0x85}, 0x804) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x2c080, 0x0) (async) sendmsg$DEVLINK_CMD_SB_PORT_POOL_SET(r0, &(0x7f0000000100)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000000c0)={&(0x7f0000000300)={0x94, 0x0, 0x8, 0x70bd25, 0x25dfdbff, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x8}, {0x6, 0x11, 0x5}, {0x8, 0x15, 0x80000001}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}, {0x8, 0xb, 0x32}, {0x6, 0x11, 0x3}, {0x8, 0x15, 0x80000000}}]}, 0x94}, 0x1, 0x0, 0x0, 0x85}, 0x804) (async) openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "13bd94e32c37a3932d8ad7271907f2903ccf3bb13b387d8fdf025cdf3c8faa37a970ea456fa2fd6f8354fc3b05088269a6d5b022e392b9bd78e5e2308e054c3e2cbb6e61b42c74f3c1ba8d63d10ed85dcc5d58071547cdfd9661f05024bcf8d7722e987a76fced66d3b33373d61da648b231fe3de6f7dc9a78420b7bf0a04efb660e06f2bf671a2060d09d80f7ee6ba3ae0b6edf87d14be34012ef95719e01f065ec7943a48dcce0fcf8f7f3a89c24d940f201c7c73a3c97872a80ca25d1a3114fe16f225f4f55f3c6456cab8f0aa59d8efdc6939eb7f2b223ceff25db5222ff8e86c024229beec9ce765151d6e706fd60ab8ffe4c2e736eec4bcae53c1aaaef"}}}, 0x120) (async) 14:44:52 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r3}}, 0x10) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r4) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r4, &(0x7f0000000000)={0x5, 0x10, 0xfa00, {&(0x7f0000000500), r3, 0x2}}, 0x18) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000a40)={0x6, 0x118, 0xfa00, {{0x2, 0x80, "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", 0x81, 0x0, 0x8, 0xfc, 0x5, 0x0, 0x1, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {r3, 0x4, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x5, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0xff}}}, 0x120) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000880)=ANY=[@ANYBLOB="018dff000100000018000019", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES16=r2, @ANYBLOB="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", @ANYRESDEC=r4, @ANYRES16=r2]) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r0, &(0x7f0000000380)={&(0x7f0000000b80)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000340)={&(0x7f0000000700)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="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"], 0x144}, 0x1, 0x0, 0x0, 0x20000850}, 0x0) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r7, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r8}}, 0x10) write$RDMA_USER_CM_CMD_NOTIFY(r5, &(0x7f0000000280)={0xf, 0x8, 0xfa00, {r8, 0xf}}, 0x10) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000080)={0xffffffffffffffff}, 0x1, {0xa, 0x4e23, 0x8, @empty, 0x2}}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, &(0x7f0000000100)={0x11, 0x10, 0xfa00, {&(0x7f0000000040), r9}}, 0x18) openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r3}}, 0x10) (async) openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) (async) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r4) (async) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r4, &(0x7f0000000000)={0x5, 0x10, 0xfa00, {&(0x7f0000000500), r3, 0x2}}, 0x18) (async) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000a40)={0x6, 0x118, 0xfa00, {{0x2, 0x80, "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", 0x81, 0x0, 0x8, 0xfc, 0x5, 0x0, 0x1, 0x1}, r3}}, 0x120) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {r3, 0x4, '\r+}', "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"}}, 0x110) (async) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x5, 0x0, "13bd94e32c37a3932d8ad7271907f2903ccf3bb13b387d8fdf025cdf3c8faa37a970ea456fa2fd6f8354fc3b05088269a6d5b022e392b9bd78e5e2308e054c3e2cbb6e61b42c74f3c1ba8d63d10ed85dcc5d58071547cdfd9661f05024bcf8d7722e987a76fced66d3b33373d61da648b231fe3de6f7dc9a78420b7bf0a04efb660e06f2bf671a2060d09d80f7ee6ba3ae0b6edf87d14be34012ef95719e01f065ec7943a48dcce0fcf8f7f3a89c24d940f201c7c73a3c97872a80ca25d1a3114fe16f225f4f55f3c6456cab8f0aa59d8efdc6939eb7f2b223ceff25db5222ff8e86c024229beec9ce765151d6e706fd60ab8ffe4c2e736eec4bcae53c1aaaef", 0x0, 0x0, 0x0, 0x0, 0xff}}}, 0x120) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000880)=ANY=[@ANYBLOB="018dff000100000018000019", @ANYRES32, @ANYRES32=0xee00, @ANYRES16=r2, @ANYBLOB="78728003ca6d90e100002d74eb48c8ced08606055079ca811e0932ae889d13958e23726a643dca7d4b982e9b40065b4dd51b0ecd706a124a1b3aa4ff6e5d5f052e71e28624d7d9fe0bc1e58407479846b54b39f53357ab4e4eeca43572059b0a482f03c132f234fecf5a656ec97b9620da7d5f70c203a494e69dcc1a9845568e875262fbfabaf9087c9ad8baf83cc80b1bf32e6334416dec46b53cbe3d98a26435a60b2790501d835263f489a47c1acd9a8028d2d6caca0002b1e0cf088cb45ef851b29f93aed70c7584a1f3ed5a9e0ff0b7737c9aa3fd56a6e57bbe415824bbacc75b4e673cba2ef161451967c8821e7603dc358a55aa391150fb1196b1b701714c796baf686e0543b6d43ef32205c3ef36b277f4792abe7eec8ab1593e0754806dbde2ac95176bcb8474066e85436d6e4aa947d18ac3932accefdffced8c92e2cb27e0ef9bcd646f128972374d2ecc3ce942da0317d5a9fdb920983d99af433419ff", @ANYRESDEC=r4, @ANYRES16=r2]) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r0, &(0x7f0000000380)={&(0x7f0000000b80)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000340)={&(0x7f0000000700)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="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"], 0x144}, 0x1, 0x0, 0x0, 0x20000850}, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_NOTIFY(r7, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r8}}, 0x10) (async) write$RDMA_USER_CM_CMD_NOTIFY(r5, &(0x7f0000000280)={0xf, 0x8, 0xfa00, {r8, 0xf}}, 0x10) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000080), 0x1, {0xa, 0x4e23, 0x8, @empty, 0x2}}}, 0x38) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, &(0x7f0000000100)={0x11, 0x10, 0xfa00, {&(0x7f0000000040), r9}}, 0x18) (async) [ 3599.492471][ T5782] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3599.500423][ T5782] R13: 00007ffe952cf46f R14: 00007f9e8ccb3300 R15: 0000000000022000 [ 3599.508424][ T5782] 14:44:52 executing program 5: r0 = inotify_init() inotify_rm_watch(r0, 0x0) r1 = inotify_init() inotify_rm_watch(r1, 0x0) (async) r2 = socket$can_bcm(0x1d, 0x2, 0x2) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x40, 0x0, &(0x7f0000000000)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2]}, 0x9) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000080), 0x241800, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x10, r3, 0x0) 14:44:52 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x40, 0x0, "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", 0x0, 0x0, 0x1, 0x0, 0x10}}}, 0x120) 14:44:52 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x40, 0x0, "13bd94e32c37a3932d8ad7271907f2903ccf3bb13b387d8fdf025cdf3c8faa37a970ea456fa2fd6f8354fc3b05088269a6d5b022e392b9bd78e5e2308e054c3e2cbb6e61b42c74f3c1ba8d63d10ed85dcc5d58071547cdfd9661f05024bcf8d7722e987a76fced66d3b33373d61da648b231fe3de6f7dc9a78420b7bf0a04efb660e06f2bf671a2060d09d80f7ee6ba3ae0b6edf87d14be34012ef95719e01f065ec7943a48dcce0fcf8f7f3a89c24d940f201c7c73a3c97872a80ca25d1a3114fe16f225f4f55f3c6456cab8f0aa59d8efdc6939eb7f2b223ceff25db5222ff8e86c024229beec9ce765151d6e706fd60ab8ffe4c2e736eec4bcae53c1aaaef", 0x0, 0x0, 0x1, 0x0, 0x10}}}, 0x120) [ 3599.574085][ T5813] FAULT_INJECTION: forcing a failure. [ 3599.574085][ T5813] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3599.587231][ T5813] CPU: 0 PID: 5813 Comm: syz-executor.0 Not tainted 5.17.0-rc2-syzkaller-00167-gdcb85f85fa6f-dirty #0 [ 3599.598248][ T5813] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3599.608305][ T5813] Call Trace: [ 3599.611579][ T5813] [ 3599.614538][ T5813] dump_stack_lvl+0xd6/0x122 [ 3599.619206][ T5813] dump_stack+0x11/0x1b 14:44:52 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "e0b3772264c43c79ea3709d20d36cc4637f10fb5de2d44e0a73f520c3612063189eaba7b99fa9556bcac2ba1fb34035db66efe1e7ea748d786f601d0dcc0875cb8313c7db8b6c64b414bd5a06373bc3fbdf80ab140bf4b8f6c4a991196664cd95bbff1abeb0e982cc9b17aac4b0381a35d7a53d098e99e432a3b2f69c8b9abd7356e7cc0700ff8a36c56bf3e8a01564cd35c263749dc7c61c59645ecda836dc9f9771ff0fcdeec9e4d22cc1722bacd35e0096e747dac83ef85aed84e433e8b13e27f70ad877ff1a53934e230ed382a6c4ff7a6c1d3bb2cee4b336dcd368e29a06ed88efe1806f129bfbdfccf6c5e3ba935eb8ad0af3928b311e0a1c89eca9c75"}}, 0x110) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x40, 0x0, "13bd94e32c37a3932d8ad7271907f2903ccf3bb13b387d8fdf025cdf3c8faa37a970ea456fa2fd6f8354fc3b05088269a6d5b022e392b9bd78e5e2308e054c3e2cbb6e61b42c74f3c1ba8d63d10ed85dcc5d58071547cdfd9661f05024bcf8d7722e987a76fced66d3b33373d61da648b231fe3de6f7dc9a78420b7bf0a04efb660e06f2bf671a2060d09d80f7ee6ba3ae0b6edf87d14be34012ef95719e01f065ec7943a48dcce0fcf8f7f3a89c24d940f201c7c73a3c97872a80ca25d1a3114fe16f225f4f55f3c6456cab8f0aa59d8efdc6939eb7f2b223ceff25db5222ff8e86c024229beec9ce765151d6e706fd60ab8ffe4c2e736eec4bcae53c1aaaef", 0x0, 0x0, 0x1, 0x0, 0x10}}}, 0x120) [ 3599.623447][ T5813] should_fail+0x23c/0x250 [ 3599.627940][ T5813] should_fail_usercopy+0x16/0x20 [ 3599.633007][ T5813] copy_page_from_iter_atomic+0x2f1/0xcd0 [ 3599.638760][ T5813] ? shmem_write_begin+0x7e/0x100 [ 3599.643826][ T5813] generic_perform_write+0x211/0x400 [ 3599.649170][ T5813] ? shmem_write_begin+0x100/0x100 [ 3599.654292][ T5813] __generic_file_write_iter+0xf7/0x2b0 [ 3599.659910][ T5813] ? generic_write_checks+0x242/0x290 [ 3599.665339][ T5813] generic_file_write_iter+0x75/0x130 [ 3599.670719][ T5813] vfs_write+0x7f5/0x950 [ 3599.674965][ T5813] ksys_write+0xd9/0x190 [ 3599.679216][ T5813] __x64_sys_write+0x3e/0x50 [ 3599.683803][ T5813] do_syscall_64+0x44/0xd0 [ 3599.688221][ T5813] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3599.694251][ T5813] RIP: 0033:0x7f9e8db3d059 [ 3599.698671][ T5813] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 3599.718276][ T5813] RSP: 002b:00007f9e8ccb3168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3599.726697][ T5813] RAX: ffffffffffffffda RBX: 00007f9e8dc4ff60 RCX: 00007f9e8db3d059 [ 3599.734744][ T5813] RDX: 0000000020000260 RSI: 0000000020000140 RDI: 0000000000000003 [ 3599.742755][ T5813] RBP: 00007f9e8ccb31d0 R08: 0000000000000000 R09: 0000000000000000 [ 3599.750712][ T5813] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3599.758664][ T5813] R13: 00007ffe952cf46f R14: 00007f9e8ccb3300 R15: 0000000000022000 [ 3599.766617][ T5813] 14:44:53 executing program 4: write$RDMA_USER_CM_CMD_REJECT(0xffffffffffffffff, 0x0, 0x0) syslog(0x2, &(0x7f0000000340)=""/16, 0x10) 14:44:53 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000080), r0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000600)=ANY=[@ANYBLOB="64000000572f3e7a27d4b9d5e361db321472f4d71f4ab8e8ba7a6640a46899db294baf8edc737dcebf3335bdb28f5e3b6a63f07d0e21236f188727652c91ed0c93b4c235fa2920be8941f3b13860c722568bb77ae1415cb146f00d65ec1a1a493ada885377dcc02360f7175fbc6a7d70a3e62a1bd9", @ANYRES16=r1, @ANYBLOB="000427bd7000fddbdf251c0000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008000b00010000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008000b00ffffffff"], 0x64}, 0x1, 0x0, 0x0, 0x4}, 0x2000000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r2) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r4, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r5}}, 0x10) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f0000000100)={0x10, 0x30, 0xfa00, {&(0x7f00000000c0), 0x4, {0xa, 0x4e21, 0xfcf, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0xffff8000}, r5}}, 0x38) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {r5, 0x0, '\r+}', "e0b3772264c43c79ea3709d20d36cc4637f10fb5de2d44e0a73f520c3612063189eaba7b99fa9556bcac2ba1fb34035db66efe1e7ea748d786f601d0dcc0875cb8313c7db8b6c64b414bd5a06373bc3fbdf80ab140bf4b8f6c4a991196664cd95bbff1abeb0e982cc9b17aac4b0381a35d7a53d098e99e432a3b2f69c8b9abd7356e7cc0700ff8a36c56bf3e8a01564cd35c263749dc7c61c59645ecda836dc9f9771ff0fcdeec9e4d22cc1722bacd35e0096e747dac83ef85aed84e433e8b13e27f70ad877ff1a53934e230ed382a6c4ff7a6c1d3bb2cee4b336dcd368e29a06ed88efe1806f129bfbdfccf6c5e3ba935eb8ad0af3928b311e0a1c89eca9c75"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) 14:44:53 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x406, "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"}}}, 0x20000260) 14:44:53 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r3}}, 0x10) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r4) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r4, &(0x7f0000000000)={0x5, 0x10, 0xfa00, {&(0x7f0000000500), r3, 0x2}}, 0x18) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000a40)={0x6, 0x118, 0xfa00, {{0x2, 0x80, "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", 0x81, 0x0, 0x8, 0xfc, 0x5, 0x0, 0x1, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {r3, 0x4, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x5, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0xff}}}, 0x120) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000880)=ANY=[@ANYBLOB="018dff000100000018000019", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES16=r2, @ANYBLOB="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", @ANYRESDEC=r4, @ANYRES16=r2]) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r0, &(0x7f0000000380)={&(0x7f0000000b80)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000340)={&(0x7f0000000700)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="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"], 0x144}, 0x1, 0x0, 0x0, 0x20000850}, 0x0) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r7, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r8}}, 0x10) write$RDMA_USER_CM_CMD_NOTIFY(r5, &(0x7f0000000280)={0xf, 0x8, 0xfa00, {r8, 0xf}}, 0x10) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000080)={0xffffffffffffffff}, 0x1, {0xa, 0x4e23, 0x8, @empty, 0x2}}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, &(0x7f0000000100)={0x11, 0x10, 0xfa00, {&(0x7f0000000040), r9}}, 0x18) openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r3}}, 0x10) (async) openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) (async) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r4) (async) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r4, &(0x7f0000000000)={0x5, 0x10, 0xfa00, {&(0x7f0000000500), r3, 0x2}}, 0x18) (async) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000a40)={0x6, 0x118, 0xfa00, {{0x2, 0x80, "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", 0x81, 0x0, 0x8, 0xfc, 0x5, 0x0, 0x1, 0x1}, r3}}, 0x120) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {r3, 0x4, '\r+}', "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"}}, 0x110) (async) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x5, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0xff}}}, 0x120) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000880)=ANY=[@ANYBLOB="018dff000100000018000019", @ANYRES32, @ANYRES32=0xee00, @ANYRES16=r2, @ANYBLOB="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", @ANYRESDEC=r4, @ANYRES16=r2]) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r0, &(0x7f0000000380)={&(0x7f0000000b80)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000340)={&(0x7f0000000700)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="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"], 0x144}, 0x1, 0x0, 0x0, 0x20000850}, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_NOTIFY(r7, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r8}}, 0x10) (async) write$RDMA_USER_CM_CMD_NOTIFY(r5, &(0x7f0000000280)={0xf, 0x8, 0xfa00, {r8, 0xf}}, 0x10) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000080), 0x1, {0xa, 0x4e23, 0x8, @empty, 0x2}}}, 0x38) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, &(0x7f0000000100)={0x11, 0x10, 0xfa00, {&(0x7f0000000040), r9}}, 0x18) (async) 14:44:53 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) r1 = io_uring_setup(0x5c07, &(0x7f0000000000)={0x0, 0x4492, 0x2, 0x2, 0x1b0, 0x0, r0}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, r1, 0x0) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r2) bind$isdn_base(r2, &(0x7f0000000080)={0x22, 0x4, 0x2, 0x2, 0x3f}, 0x6) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0xb, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0xcbc8, 0x0, 0x0, 0x0, 0x400}, [@generic={0x8, 0x4, 0x7, 0x6, 0xffff8000}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x1}, @jmp={0x5, 0x0, 0x0, 0x3, 0x0, 0x8, 0xfffffffffffffff0}, @map_val={0x18, 0x9, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x1}]}, &(0x7f00000001c0)='syzkaller\x00', 0x1, 0x31, &(0x7f0000000200)=""/49, 0x41100, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000300)={0x5, 0xc, 0x10000, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000340)=[r2, r2, r2, r2, r0, r2]}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='initcall_finish\x00', r3}, 0x10) ioctl$IMSETDEVNAME(r2, 0x80184947, &(0x7f00000005c0)={0x401, 'syz1\x00'}) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r4) write$RDMA_USER_CM_CMD_GET_EVENT(r4, &(0x7f0000000580)={0xc, 0x8, 0xfa00, {&(0x7f0000000400)}}, 0x10) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000600), 0x240500, 0x0) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r5, 0x84, 0xc, &(0x7f0000000640), &(0x7f0000000680)=0x4) 14:44:53 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x20000260) (fail_nth: 64) 14:44:53 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) r1 = io_uring_setup(0x5c07, &(0x7f0000000000)={0x0, 0x4492, 0x2, 0x2, 0x1b0, 0x0, r0}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, r1, 0x0) (async) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r2) bind$isdn_base(r2, &(0x7f0000000080)={0x22, 0x4, 0x2, 0x2, 0x3f}, 0x6) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0xb, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0xcbc8, 0x0, 0x0, 0x0, 0x400}, [@generic={0x8, 0x4, 0x7, 0x6, 0xffff8000}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x1}, @jmp={0x5, 0x0, 0x0, 0x3, 0x0, 0x8, 0xfffffffffffffff0}, @map_val={0x18, 0x9, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x1}]}, &(0x7f00000001c0)='syzkaller\x00', 0x1, 0x31, &(0x7f0000000200)=""/49, 0x41100, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000300)={0x5, 0xc, 0x10000, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000340)=[r2, r2, r2, r2, r0, r2]}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='initcall_finish\x00', r3}, 0x10) ioctl$IMSETDEVNAME(r2, 0x80184947, &(0x7f00000005c0)={0x401, 'syz1\x00'}) (async, rerun: 64) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) (rerun: 64) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r4) write$RDMA_USER_CM_CMD_GET_EVENT(r4, &(0x7f0000000580)={0xc, 0x8, 0xfa00, {&(0x7f0000000400)}}, 0x10) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000600), 0x240500, 0x0) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r5, 0x84, 0xc, &(0x7f0000000640), &(0x7f0000000680)=0x4) [ 3600.402356][ T5872] FAULT_INJECTION: forcing a failure. [ 3600.402356][ T5872] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3600.415611][ T5872] CPU: 0 PID: 5872 Comm: syz-executor.0 Not tainted 5.17.0-rc2-syzkaller-00167-gdcb85f85fa6f-dirty #0 [ 3600.426600][ T5872] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3600.436656][ T5872] Call Trace: [ 3600.439932][ T5872] [ 3600.442859][ T5872] dump_stack_lvl+0xd6/0x122 [ 3600.447468][ T5872] dump_stack+0x11/0x1b 14:44:53 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) r1 = io_uring_setup(0x5c07, &(0x7f0000000000)={0x0, 0x4492, 0x2, 0x2, 0x1b0, 0x0, r0}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, r1, 0x0) (async) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r2) bind$isdn_base(r2, &(0x7f0000000080)={0x22, 0x4, 0x2, 0x2, 0x3f}, 0x6) (async) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0xb, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0xcbc8, 0x0, 0x0, 0x0, 0x400}, [@generic={0x8, 0x4, 0x7, 0x6, 0xffff8000}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x1}, @jmp={0x5, 0x0, 0x0, 0x3, 0x0, 0x8, 0xfffffffffffffff0}, @map_val={0x18, 0x9, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x1}]}, &(0x7f00000001c0)='syzkaller\x00', 0x1, 0x31, &(0x7f0000000200)=""/49, 0x41100, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000300)={0x5, 0xc, 0x10000, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000340)=[r2, r2, r2, r2, r0, r2]}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='initcall_finish\x00', r3}, 0x10) (async) ioctl$IMSETDEVNAME(r2, 0x80184947, &(0x7f00000005c0)={0x401, 'syz1\x00'}) (async) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r4) write$RDMA_USER_CM_CMD_GET_EVENT(r4, &(0x7f0000000580)={0xc, 0x8, 0xfa00, {&(0x7f0000000400)}}, 0x10) (async) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000600), 0x240500, 0x0) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r5, 0x84, 0xc, &(0x7f0000000640), &(0x7f0000000680)=0x4) [ 3600.451647][ T5872] should_fail+0x23c/0x250 [ 3600.456065][ T5872] __alloc_pages+0x102/0x330 [ 3600.460658][ T5872] alloc_pages_vma+0x67e/0x810 [ 3600.465453][ T5872] ? percpu_counter_add_batch+0x109/0x130 [ 3600.471175][ T5872] shmem_getpage_gfp+0x8b4/0x12c0 [ 3600.476202][ T5872] ? do_user_addr_fault+0x7d4/0xb90 [ 3600.481488][ T5872] shmem_write_begin+0x7e/0x100 [ 3600.486344][ T5872] generic_perform_write+0x1c8/0x400 [ 3600.491635][ T5872] ? shmem_write_begin+0x100/0x100 [ 3600.496758][ T5872] __generic_file_write_iter+0xf7/0x2b0 14:44:53 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) r1 = socket(0x23, 0x2, 0x0) openat$bsg(0xffffffffffffff9c, &(0x7f0000000040), 0x240, 0x0) sendmsg$WG_CMD_GET_DEVICE(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x20) mmap$IORING_OFF_SQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0x0) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r2) r3 = syz_genetlink_get_family_id$devlink(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RATE_GET(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x64, r3, 0x100, 0x70bd2b, 0x25dfdbff, {}, [@handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_RATE_NODE_NAME={0xe}, @handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}]}, 0x64}, 0x1, 0x0, 0x0, 0x24048084}, 0x0) sendmsg$DEVLINK_CMD_PORT_GET(r2, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x98000020}, 0xc, &(0x7f00000000c0)={&(0x7f0000000180)={0xdc, r3, 0x100, 0x70bd2a, 0x25dfdbfd, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x3}}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}}]}, 0xdc}, 0x1, 0x0, 0x0, 0x24000000}, 0x8080) openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x802, 0x0) [ 3600.502414][ T5872] ? generic_write_checks+0x242/0x290 [ 3600.507796][ T5872] generic_file_write_iter+0x75/0x130 [ 3600.513175][ T5872] vfs_write+0x7f5/0x950 [ 3600.517484][ T5872] ksys_write+0xd9/0x190 [ 3600.521738][ T5872] __x64_sys_write+0x3e/0x50 [ 3600.526357][ T5872] do_syscall_64+0x44/0xd0 [ 3600.530777][ T5872] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3600.536677][ T5872] RIP: 0033:0x7f9e8db3d059 [ 3600.541113][ T5872] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 3600.560825][ T5872] RSP: 002b:00007f9e8ccb3168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3600.569320][ T5872] RAX: ffffffffffffffda RBX: 00007f9e8dc4ff60 RCX: 00007f9e8db3d059 [ 3600.577296][ T5872] RDX: 0000000020000260 RSI: 0000000020000140 RDI: 0000000000000003 [ 3600.585461][ T5872] RBP: 00007f9e8ccb31d0 R08: 0000000000000000 R09: 0000000000000000 [ 3600.593470][ T5872] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 14:44:53 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) (async) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000080), r0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000600)=ANY=[@ANYBLOB="64000000572f3e7a27d4b9d5e361db321472f4d71f4ab8e8ba7a6640a46899db294baf8edc737dcebf3335bdb28f5e3b6a63f07d0e21236f188727652c91ed0c93b4c235fa2920be8941f3b13860c722568bb77ae1415cb146f00d65ec1a1a493ada885377dcc02360f7175fbc6a7d70a3e62a1bd9", @ANYRES16=r1, @ANYBLOB="000427bd7000fddbdf251c0000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008000b00010000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008000b00ffffffff"], 0x64}, 0x1, 0x0, 0x0, 0x4}, 0x2000000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r2) (async) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r4, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r5}}, 0x10) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f0000000100)={0x10, 0x30, 0xfa00, {&(0x7f00000000c0), 0x4, {0xa, 0x4e21, 0xfcf, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0xffff8000}, r5}}, 0x38) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {r5, 0x0, '\r+}', "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"}}, 0x110) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) 14:44:53 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) (async) r1 = socket(0x23, 0x2, 0x0) openat$bsg(0xffffffffffffff9c, &(0x7f0000000040), 0x240, 0x0) (async) sendmsg$WG_CMD_GET_DEVICE(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x20) (async) mmap$IORING_OFF_SQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0x0) (async) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r2) (async) r3 = syz_genetlink_get_family_id$devlink(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RATE_GET(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x64, r3, 0x100, 0x70bd2b, 0x25dfdbff, {}, [@handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_RATE_NODE_NAME={0xe}, @handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}]}, 0x64}, 0x1, 0x0, 0x0, 0x24048084}, 0x0) sendmsg$DEVLINK_CMD_PORT_GET(r2, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x98000020}, 0xc, &(0x7f00000000c0)={&(0x7f0000000180)={0xdc, r3, 0x100, 0x70bd2a, 0x25dfdbfd, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x3}}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}}]}, 0xdc}, 0x1, 0x0, 0x0, 0x24000000}, 0x8080) openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x802, 0x0) 14:44:53 executing program 4: write$RDMA_USER_CM_CMD_REJECT(0xffffffffffffffff, 0x0, 0x0) syslog(0x2, &(0x7f0000000340)=""/16, 0x10) 14:44:53 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r2) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r3}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x80000001}, {0xa, 0x4e20, 0x9, @private1={0xfc, 0x1, '\x00', 0x1}, 0x1}, r3, 0x80}}, 0x48) 14:44:53 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x408, "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"}}}, 0x20000260) [ 3600.601464][ T5872] R13: 00007ffe952cf46f R14: 00007f9e8ccb3300 R15: 0000000000022000 [ 3600.609518][ T5872] 14:44:53 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) (async, rerun: 32) r1 = socket(0x23, 0x2, 0x0) (rerun: 32) openat$bsg(0xffffffffffffff9c, &(0x7f0000000040), 0x240, 0x0) (async) sendmsg$WG_CMD_GET_DEVICE(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x20) (async) mmap$IORING_OFF_SQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0x0) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r2) (async) r3 = syz_genetlink_get_family_id$devlink(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RATE_GET(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x64, r3, 0x100, 0x70bd2b, 0x25dfdbff, {}, [@handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_RATE_NODE_NAME={0xe}, @handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}]}, 0x64}, 0x1, 0x0, 0x0, 0x24048084}, 0x0) (async) sendmsg$DEVLINK_CMD_PORT_GET(r2, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x98000020}, 0xc, &(0x7f00000000c0)={&(0x7f0000000180)={0xdc, r3, 0x100, 0x70bd2a, 0x25dfdbfd, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x3}}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}}]}, 0xdc}, 0x1, 0x0, 0x0, 0x24000000}, 0x8080) (async, rerun: 32) openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x802, 0x0) (rerun: 32) 14:44:53 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x20000260) (fail_nth: 65) [ 3600.670942][ T5903] FAULT_INJECTION: forcing a failure. [ 3600.670942][ T5903] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3600.684072][ T5903] CPU: 1 PID: 5903 Comm: syz-executor.0 Not tainted 5.17.0-rc2-syzkaller-00167-gdcb85f85fa6f-dirty #0 [ 3600.695006][ T5903] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3600.705058][ T5903] Call Trace: [ 3600.708335][ T5903] [ 3600.711263][ T5903] dump_stack_lvl+0xd6/0x122 [ 3600.715854][ T5903] dump_stack+0x11/0x1b 14:44:53 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000080), r0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000600)=ANY=[@ANYBLOB="64000000572f3e7a27d4b9d5e361db321472f4d71f4ab8e8ba7a6640a46899db294baf8edc737dcebf3335bdb28f5e3b6a63f07d0e21236f188727652c91ed0c93b4c235fa2920be8941f3b13860c722568bb77ae1415cb146f00d65ec1a1a493ada885377dcc02360f7175fbc6a7d70a3e62a1bd9", @ANYRES16=r1, @ANYBLOB="000427bd7000fddbdf251c0000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008000b00010000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008000b00ffffffff"], 0x64}, 0x1, 0x0, 0x0, 0x4}, 0x2000000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r2) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r4, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r5}}, 0x10) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f0000000100)={0x10, 0x30, 0xfa00, {&(0x7f00000000c0), 0x4, {0xa, 0x4e21, 0xfcf, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0xffff8000}, r5}}, 0x38) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {r5, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) (async) syz_genetlink_get_family_id$devlink(&(0x7f0000000080), r0) (async) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000600)=ANY=[@ANYBLOB="64000000572f3e7a27d4b9d5e361db321472f4d71f4ab8e8ba7a6640a46899db294baf8edc737dcebf3335bdb28f5e3b6a63f07d0e21236f188727652c91ed0c93b4c235fa2920be8941f3b13860c722568bb77ae1415cb146f00d65ec1a1a493ada885377dcc02360f7175fbc6a7d70a3e62a1bd9", @ANYRES16=r1, @ANYBLOB="000427bd7000fddbdf251c0000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008000b00010000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008000b00ffffffff"], 0x64}, 0x1, 0x0, 0x0, 0x4}, 0x2000000) (async) openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) (async) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r2) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_NOTIFY(r4, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r5}}, 0x10) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f0000000100)={0x10, 0x30, 0xfa00, {&(0x7f00000000c0), 0x4, {0xa, 0x4e21, 0xfcf, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0xffff8000}, r5}}, 0x38) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {r5, 0x0, '\r+}', "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"}}, 0x110) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) (async) 14:44:53 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) (async) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async, rerun: 64) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) (rerun: 64) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r2) (async, rerun: 32) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) (rerun: 32) write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r3}}, 0x10) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x80000001}, {0xa, 0x4e20, 0x9, @private1={0xfc, 0x1, '\x00', 0x1}, 0x1}, r3, 0x80}}, 0x48) 14:44:53 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) (async) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r2) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r3}}, 0x10) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x80000001}, {0xa, 0x4e20, 0x9, @private1={0xfc, 0x1, '\x00', 0x1}, 0x1}, r3, 0x80}}, 0x48) [ 3600.720076][ T5903] should_fail+0x23c/0x250 [ 3600.724494][ T5903] should_fail_usercopy+0x16/0x20 [ 3600.729596][ T5903] copy_page_from_iter_atomic+0x2f1/0xcd0 [ 3600.735370][ T5903] ? shmem_write_begin+0x7e/0x100 [ 3600.740505][ T5903] generic_perform_write+0x211/0x400 [ 3600.745795][ T5903] ? shmem_write_begin+0x100/0x100 [ 3600.750968][ T5903] __generic_file_write_iter+0xf7/0x2b0 [ 3600.756521][ T5903] ? generic_write_checks+0x242/0x290 [ 3600.761967][ T5903] generic_file_write_iter+0x75/0x130 [ 3600.767392][ T5903] vfs_write+0x7f5/0x950 [ 3600.771713][ T5903] ksys_write+0xd9/0x190 [ 3600.775952][ T5903] __x64_sys_write+0x3e/0x50 [ 3600.780610][ T5903] do_syscall_64+0x44/0xd0 [ 3600.785031][ T5903] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3600.791029][ T5903] RIP: 0033:0x7f9e8db3d059 [ 3600.795441][ T5903] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 14:44:53 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x500, "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"}}}, 0x20000260) 14:44:54 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000080)=0xa, 0xffffffffffffffff, 0x0, 0x0, 0xfece}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r4}}, 0x10) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000500)={0x6, 0x118, 0xfa00, {{0x101, 0xd947, "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", 0xc0, 0x3, 0xf7, 0x98, 0xb4, 0xa, 0x6}, r4}}, 0x120) 14:44:54 executing program 4: write$RDMA_USER_CM_CMD_REJECT(0xffffffffffffffff, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\r+}', "e0b3772264c43c79ea3709d20d36cc4637f10fb5de2d44e0a73f520c3612063189eaba7b99fa9556bcac2ba1fb34035db66efe1e7ea748d786f601d0dcc0875cb8313c7db8b6c64b414bd5a06373bc3fbdf80ab140bf4b8f6c4a991196664cd95bbff1abeb0e982cc9b17aac4b0381a35d7a53d098e99e432a3b2f69c8b9abd7356e7cc0700ff8a36c56bf3e8a01564cd35c263749dc7c61c59645ecda836dc9f9771ff0fcdeec9e4d22cc1722bacd35e0096e747dac83ef85aed84e433e8b13e27f70ad877ff1a53934e230ed382a6c4ff7a6c1d3bb2cee4b336dcd368e29a06ed88efe1806f129bfbdfccf6c5e3ba935eb8ad0af3928b311e0a1c89eca9c75"}}, 0x110) syslog(0x0, &(0x7f0000000340)=""/16, 0x10) 14:44:54 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x452281, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x8000, 0x0) connect$pptp(r1, &(0x7f0000000040)={0x18, 0x2, {0x1, @multicast2}}, 0x1e) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x200000a, 0x10010, r0, 0x10000000) [ 3600.815043][ T5903] RSP: 002b:00007f9e8ccb3168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3600.823451][ T5903] RAX: ffffffffffffffda RBX: 00007f9e8dc4ff60 RCX: 00007f9e8db3d059 [ 3600.831420][ T5903] RDX: 0000000020000260 RSI: 0000000020000140 RDI: 0000000000000003 [ 3600.839468][ T5903] RBP: 00007f9e8ccb31d0 R08: 0000000000000000 R09: 0000000000000000 [ 3600.847443][ T5903] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3600.855416][ T5903] R13: 00007ffe952cf46f R14: 00007f9e8ccb3300 R15: 0000000000022000 [ 3600.863450][ T5903] 14:44:54 executing program 2: futex_waitv(&(0x7f0000001480)=[{0x6, &(0x7f0000000040)=0x4, 0x82}, {0x6, &(0x7f0000000080)=0x7, 0x80}, {0x477f, &(0x7f00000000c0)=0x5, 0x2}, {0x3, &(0x7f0000000100)=0x5, 0x82}, {0x6, &(0x7f0000000280)=0x7, 0x2}, {0x20, &(0x7f0000000300)=0x1, 0x82}, {0xfff, &(0x7f0000000340)=0x8, 0x2}, {0x7, &(0x7f0000000380)=0x101, 0x82}, {0x100000000, &(0x7f00000003c0)=0x3, 0x2}, {0x9, &(0x7f0000000400)=0x8, 0x2}, {0x6, &(0x7f0000000440)=0x6, 0x82}, {0x8, &(0x7f0000000480)=0x7, 0x82}, {0x5, &(0x7f00000004c0)=0xd86, 0x82}, {0x7, &(0x7f0000000500), 0x2}, {0x8000, &(0x7f0000000540)=0x80000001, 0x82}, {0x0, &(0x7f0000000580)=0x4, 0x2}, {0x0, &(0x7f00000005c0)=0x100000000, 0x82}, {0x3ff, &(0x7f0000000600)=0x1000000, 0x82}, {0xfffffffffffffffa, &(0x7f0000000640)=0x4, 0x2}, {0x3f5f1888, &(0x7f0000000680)=0x49f7cfc2, 0x2}, {0x1000, &(0x7f00000006c0)=0x3, 0x82}, {0x7ff, &(0x7f0000000700)=0x1, 0x2}, {0x20, &(0x7f0000000740)=0x5, 0x82}, {0x5b, &(0x7f0000000780)=0x7fffffff, 0x82}, {0xf, &(0x7f00000007c0)=0x9, 0x2}, {0x4, &(0x7f0000000800)=0xffffffffffffff2d, 0x2}, {0x977, &(0x7f0000000840)=0xc9c, 0x2}, {0x632a, &(0x7f0000000880)=0x400, 0x82}, {0xe1, &(0x7f00000008c0)=0x80000001, 0x82}, {0x3ff, &(0x7f0000000900)=0x9, 0x2}, {0xf73, &(0x7f0000000940)=0x7, 0x2}, {0x8000000000, &(0x7f0000000980)=0x7fffffff, 0x82}, {0x200, &(0x7f00000009c0)=0x800, 0x2}, {0x3, &(0x7f0000000a00)=0x2, 0x1}, {0x7fffffff, &(0x7f0000000a40)=0x3, 0x80}, {0x8, &(0x7f0000000a80)=0x10001, 0x2}, {0x3ff, &(0x7f0000000ac0)=0x100000001, 0x82}, {0x5, &(0x7f0000000b00)=0x7, 0x2}, {0xc0, &(0x7f0000000b40)=0x3, 0x82}, {0x9f57, &(0x7f0000000b80), 0x82}, {0x30e2, &(0x7f0000000bc0)=0x200, 0x2}, {0xe63, &(0x7f0000000c00)=0xff, 0x2}, {0x3, &(0x7f0000000c40)=0x10001, 0x82}, {0xecdd, &(0x7f0000000c80)=0x4}, {0x9, &(0x7f0000000cc0)=0x99c, 0x82}, {0x10000, &(0x7f000000