last executing test programs:

1.195964085s ago: executing program 3 (id=179):
getegid()

1.195204906s ago: executing program 3 (id=184):
syz_open_dev$sndhw(&(0x7f0000000040), 0x0, 0x0)
syz_open_dev$sndhw(&(0x7f0000000080), 0x0, 0x1)
syz_open_dev$sndhw(&(0x7f00000000c0), 0x0, 0x2)
syz_open_dev$sndhw(&(0x7f0000000100), 0x0, 0x800)
syz_open_dev$sndhw(&(0x7f0000000140), 0xa, 0x0)
syz_open_dev$sndhw(&(0x7f0000000180), 0xa, 0x1)
syz_open_dev$sndhw(&(0x7f00000001c0), 0xa, 0x2)
syz_open_dev$sndhw(&(0x7f0000000200), 0xa, 0x800)
syz_open_dev$sndhw(&(0x7f0000000240), 0x14, 0x0)
syz_open_dev$sndhw(&(0x7f0000000280), 0x14, 0x1)
syz_open_dev$sndhw(&(0x7f00000002c0), 0x14, 0x2)
syz_open_dev$sndhw(&(0x7f0000000300), 0x14, 0x800)
syz_open_dev$sndhw(&(0x7f0000000340), 0x1e, 0x0)
syz_open_dev$sndhw(&(0x7f0000000380), 0x1e, 0x1)
syz_open_dev$sndhw(&(0x7f00000003c0), 0x1e, 0x2)
syz_open_dev$sndhw(&(0x7f0000000400), 0x1e, 0x800)
syz_open_dev$sndhw(&(0x7f0000000440), 0x28, 0x0)
syz_open_dev$sndhw(&(0x7f0000000480), 0x28, 0x1)
syz_open_dev$sndhw(&(0x7f00000004c0), 0x28, 0x2)
syz_open_dev$sndhw(&(0x7f0000000500), 0x28, 0x800)

1.178220625s ago: executing program 3 (id=190):
getrlimit(0x0, &(0x7f0000000000))

1.162174416s ago: executing program 3 (id=196):
rt_sigpending(&(0x7f0000000000), 0x0)

1.161936536s ago: executing program 3 (id=199):
newfstatat(0xffffffffffffff9c, &(0x7f0000000000), &(0x7f0000000000), 0x0)

1.143761056s ago: executing program 3 (id=203):
pause()

713.261651ms ago: executing program 1 (id=357):
openat(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio', 0x0, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio', 0x1, 0x0)
openat(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio', 0x2, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='/dev/audio', 0x800, 0x0)

712.454921ms ago: executing program 1 (id=360):
socket$can_bcm(0x1d, 0x2, 0x2)

690.583182ms ago: executing program 1 (id=366):
timer_gettime(0x0, &(0x7f0000000000))

690.337322ms ago: executing program 1 (id=368):
set_thread_area(&(0x7f0000000000))

667.908542ms ago: executing program 1 (id=374):
socket$pppl2tp(0x18, 0x1, 0x1)

667.422862ms ago: executing program 1 (id=377):
rt_sigreturn()

398.135315ms ago: executing program 0 (id=444):
chroot(&(0x7f0000000000))

397.726975ms ago: executing program 0 (id=447):
timer_delete(0x0)

397.407795ms ago: executing program 0 (id=450):
openat(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ocfs2_control', 0x0, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ocfs2_control', 0x1, 0x0)
openat(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ocfs2_control', 0x2, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ocfs2_control', 0x800, 0x0)

375.563636ms ago: executing program 2 (id=451):
prlimit64(0x0, 0x0, 0x0, 0x0)

375.391926ms ago: executing program 0 (id=452):
openat(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb1', 0x0, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fb1', 0x1, 0x0)
openat(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fb1', 0x2, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fb1', 0x800, 0x0)

375.281306ms ago: executing program 2 (id=453):
openat(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full', 0x0, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full', 0x1, 0x0)
openat(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full', 0x2, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full', 0x800, 0x0)

375.197826ms ago: executing program 0 (id=454):
userfaultfd(0x0)

374.995096ms ago: executing program 2 (id=456):
syz_init_net_socket$netrom(0x6, 0x5, 0x0)

326.604786ms ago: executing program 4 (id=459):
ftruncate(0xffffffffffffffff, 0x0)

326.490606ms ago: executing program 4 (id=461):
uselib(0x0)

326.429226ms ago: executing program 2 (id=462):
readv(0xffffffffffffffff, &(0x7f0000000000), 0x0)

326.362416ms ago: executing program 4 (id=463):
getrandom(&(0x7f0000000000), 0x0, 0x0)

326.250616ms ago: executing program 2 (id=464):
socket$rds(0x15, 0x5, 0x0)

319.984836ms ago: executing program 2 (id=465):
syz_init_net_socket$llc(0x1a, 0x1, 0x0)

315.229686ms ago: executing program 0 (id=460):
mmap(&(0x7efffffff000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000000000/0x1000000)=nil, 0x1000000, 0x7, 0x32, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0001000000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0)

270.648917ms ago: executing program 4 (id=467):
setfsgid(0x0)

270.428507ms ago: executing program 4 (id=468):
symlink(&(0x7f0000000000), &(0x7f0000000000))

76.538639ms ago: executing program 5 (id=466):
listen(0xffffffffffffffff, 0x0)

0s ago: executing program 4 (id=470):
mmap(&(0x7efffffff000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000000000/0x1000000)=nil, 0x1000000, 0x7, 0x32, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0001000000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0)

kernel console output (not intermixed with test programs):

Warning: Permanently added '10.128.10.50' (ED25519) to the list of known hosts.
[   27.566047][   T29] audit: type=1400 audit(1747039522.884:65): avc:  denied  { mounton } for  pid=3302 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1
[   27.567164][ T3302] cgroup: Unknown subsys name 'net'
[   27.589149][   T29] audit: type=1400 audit(1747039522.884:66): avc:  denied  { mount } for  pid=3302 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1
[   27.617360][   T29] audit: type=1400 audit(1747039522.924:67): avc:  denied  { unmount } for  pid=3302 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1
[   27.753479][ T3302] cgroup: Unknown subsys name 'cpuset'
[   27.760100][ T3302] cgroup: Unknown subsys name 'rlimit'
[   27.952395][   T29] audit: type=1400 audit(1747039523.264:68): avc:  denied  { setattr } for  pid=3302 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=142 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1
[   27.978524][   T29] audit: type=1400 audit(1747039523.274:69): avc:  denied  { create } for  pid=3302 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1
[   28.000041][   T29] audit: type=1400 audit(1747039523.274:70): avc:  denied  { write } for  pid=3302 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1
[   28.020977][   T29] audit: type=1400 audit(1747039523.274:71): avc:  denied  { read } for  pid=3302 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1
[   28.029688][ T3307] SELinux:  Context root:object_r:swapfile_t is not valid (left unmapped).
[   28.042538][   T29] audit: type=1400 audit(1747039523.284:72): avc:  denied  { mounton } for  pid=3302 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1
[   28.076328][   T29] audit: type=1400 audit(1747039523.284:73): avc:  denied  { mount } for  pid=3302 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1
Setting up swapspace version 1, size = 127995904 bytes
[   28.099902][   T29] audit: type=1400 audit(1747039523.374:74): avc:  denied  { relabelto } for  pid=3307 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t"
[   28.130260][ T3302] Adding 124996k swap on ./swap-file.  Priority:0 extents:1 across:124996k 
[   29.124418][ T3356] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list
[   29.779071][ T3611] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list
[   30.864994][ T3808] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality.
[   30.969478][ T3006] ==================================================================
[   30.977802][ T3006] BUG: KCSAN: data-race in dont_mount / lookup_fast
[   30.984721][ T3006] 
[   30.987153][ T3006] read-write to 0xffff888106ddf240 of 4 bytes by task 3812 on cpu 1:
[   30.995242][ T3006]  dont_mount+0x2a/0x40
[   30.999423][ T3006]  vfs_unlink+0x28f/0x420
[   31.003872][ T3006]  do_unlinkat+0x28e/0x4c0
[   31.008345][ T3006]  __x64_sys_unlink+0x2e/0x40
[   31.013163][ T3006]  x64_sys_call+0x22a6/0x2fb0
[   31.017875][ T3006]  do_syscall_64+0xd0/0x1a0
[   31.022409][ T3006]  entry_SYSCALL_64_after_hwframe+0x77/0x7f
[   31.028346][ T3006] 
[   31.030683][ T3006] read to 0xffff888106ddf240 of 4 bytes by task 3006 on cpu 0:
[   31.038429][ T3006]  lookup_fast+0xf0/0x320
[   31.043322][ T3006]  walk_component+0x3f/0x220
[   31.048017][ T3006]  path_lookupat+0xfe/0x2a0
[   31.052654][ T3006]  filename_lookup+0x147/0x340
[   31.057637][ T3006]  do_readlinkat+0x7d/0x320
[   31.062148][ T3006]  __x64_sys_readlink+0x47/0x60
[   31.067095][ T3006]  x64_sys_call+0x2cf3/0x2fb0
[   31.071783][ T3006]  do_syscall_64+0xd0/0x1a0
[   31.076470][ T3006]  entry_SYSCALL_64_after_hwframe+0x77/0x7f
[   31.082468][ T3006] 
[   31.084806][ T3006] value changed: 0x00300008 -> 0x00004008
[   31.090668][ T3006] 
[   31.093089][ T3006] Reported by Kernel Concurrency Sanitizer on:
[   31.099261][ T3006] CPU: 0 UID: 0 PID: 3006 Comm: udevd Not tainted 6.15.0-rc6-syzkaller #0 PREEMPT(voluntary) 
[   31.109773][ T3006] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025
SYZFAIL: failed to recv rpc
fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor)
[   31.120103][ T3006] ==================================================================