last executing test programs: 1.195964085s ago: executing program 3 (id=179): getegid() 1.195204906s ago: executing program 3 (id=184): syz_open_dev$sndhw(&(0x7f0000000040), 0x0, 0x0) syz_open_dev$sndhw(&(0x7f0000000080), 0x0, 0x1) syz_open_dev$sndhw(&(0x7f00000000c0), 0x0, 0x2) syz_open_dev$sndhw(&(0x7f0000000100), 0x0, 0x800) syz_open_dev$sndhw(&(0x7f0000000140), 0xa, 0x0) syz_open_dev$sndhw(&(0x7f0000000180), 0xa, 0x1) syz_open_dev$sndhw(&(0x7f00000001c0), 0xa, 0x2) syz_open_dev$sndhw(&(0x7f0000000200), 0xa, 0x800) syz_open_dev$sndhw(&(0x7f0000000240), 0x14, 0x0) syz_open_dev$sndhw(&(0x7f0000000280), 0x14, 0x1) syz_open_dev$sndhw(&(0x7f00000002c0), 0x14, 0x2) syz_open_dev$sndhw(&(0x7f0000000300), 0x14, 0x800) syz_open_dev$sndhw(&(0x7f0000000340), 0x1e, 0x0) syz_open_dev$sndhw(&(0x7f0000000380), 0x1e, 0x1) syz_open_dev$sndhw(&(0x7f00000003c0), 0x1e, 0x2) syz_open_dev$sndhw(&(0x7f0000000400), 0x1e, 0x800) syz_open_dev$sndhw(&(0x7f0000000440), 0x28, 0x0) syz_open_dev$sndhw(&(0x7f0000000480), 0x28, 0x1) syz_open_dev$sndhw(&(0x7f00000004c0), 0x28, 0x2) syz_open_dev$sndhw(&(0x7f0000000500), 0x28, 0x800) 1.178220625s ago: executing program 3 (id=190): getrlimit(0x0, &(0x7f0000000000)) 1.162174416s ago: executing program 3 (id=196): rt_sigpending(&(0x7f0000000000), 0x0) 1.161936536s ago: executing program 3 (id=199): newfstatat(0xffffffffffffff9c, &(0x7f0000000000), &(0x7f0000000000), 0x0) 1.143761056s ago: executing program 3 (id=203): pause() 713.261651ms ago: executing program 1 (id=357): openat(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio', 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio', 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='/dev/audio', 0x800, 0x0) 712.454921ms ago: executing program 1 (id=360): socket$can_bcm(0x1d, 0x2, 0x2) 690.583182ms ago: executing program 1 (id=366): timer_gettime(0x0, &(0x7f0000000000)) 690.337322ms ago: executing program 1 (id=368): set_thread_area(&(0x7f0000000000)) 667.908542ms ago: executing program 1 (id=374): socket$pppl2tp(0x18, 0x1, 0x1) 667.422862ms ago: executing program 1 (id=377): rt_sigreturn() 398.135315ms ago: executing program 0 (id=444): chroot(&(0x7f0000000000)) 397.726975ms ago: executing program 0 (id=447): timer_delete(0x0) 397.407795ms ago: executing program 0 (id=450): openat(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ocfs2_control', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ocfs2_control', 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ocfs2_control', 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ocfs2_control', 0x800, 0x0) 375.563636ms ago: executing program 2 (id=451): prlimit64(0x0, 0x0, 0x0, 0x0) 375.391926ms ago: executing program 0 (id=452): openat(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb1', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fb1', 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fb1', 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fb1', 0x800, 0x0) 375.281306ms ago: executing program 2 (id=453): openat(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full', 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full', 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full', 0x800, 0x0) 375.197826ms ago: executing program 0 (id=454): userfaultfd(0x0) 374.995096ms ago: executing program 2 (id=456): syz_init_net_socket$netrom(0x6, 0x5, 0x0) 326.604786ms ago: executing program 4 (id=459): ftruncate(0xffffffffffffffff, 0x0) 326.490606ms ago: executing program 4 (id=461): uselib(0x0) 326.429226ms ago: executing program 2 (id=462): readv(0xffffffffffffffff, &(0x7f0000000000), 0x0) 326.362416ms ago: executing program 4 (id=463): getrandom(&(0x7f0000000000), 0x0, 0x0) 326.250616ms ago: executing program 2 (id=464): socket$rds(0x15, 0x5, 0x0) 319.984836ms ago: executing program 2 (id=465): syz_init_net_socket$llc(0x1a, 0x1, 0x0) 315.229686ms ago: executing program 0 (id=460): mmap(&(0x7efffffff000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x1000000)=nil, 0x1000000, 0x7, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0001000000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 270.648917ms ago: executing program 4 (id=467): setfsgid(0x0) 270.428507ms ago: executing program 4 (id=468): symlink(&(0x7f0000000000), &(0x7f0000000000)) 76.538639ms ago: executing program 5 (id=466): listen(0xffffffffffffffff, 0x0) 0s ago: executing program 4 (id=470): mmap(&(0x7efffffff000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x1000000)=nil, 0x1000000, 0x7, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0001000000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.10.50' (ED25519) to the list of known hosts. [ 27.566047][ T29] audit: type=1400 audit(1747039522.884:65): avc: denied { mounton } for pid=3302 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 27.567164][ T3302] cgroup: Unknown subsys name 'net' [ 27.589149][ T29] audit: type=1400 audit(1747039522.884:66): avc: denied { mount } for pid=3302 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 27.617360][ T29] audit: type=1400 audit(1747039522.924:67): avc: denied { unmount } for pid=3302 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 27.753479][ T3302] cgroup: Unknown subsys name 'cpuset' [ 27.760100][ T3302] cgroup: Unknown subsys name 'rlimit' [ 27.952395][ T29] audit: type=1400 audit(1747039523.264:68): avc: denied { setattr } for pid=3302 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=142 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 27.978524][ T29] audit: type=1400 audit(1747039523.274:69): avc: denied { create } for pid=3302 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 28.000041][ T29] audit: type=1400 audit(1747039523.274:70): avc: denied { write } for pid=3302 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 28.020977][ T29] audit: type=1400 audit(1747039523.274:71): avc: denied { read } for pid=3302 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 28.029688][ T3307] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 28.042538][ T29] audit: type=1400 audit(1747039523.284:72): avc: denied { mounton } for pid=3302 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 28.076328][ T29] audit: type=1400 audit(1747039523.284:73): avc: denied { mount } for pid=3302 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 28.099902][ T29] audit: type=1400 audit(1747039523.374:74): avc: denied { relabelto } for pid=3307 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 28.130260][ T3302] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 29.124418][ T3356] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 29.779071][ T3611] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 30.864994][ T3808] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 30.969478][ T3006] ================================================================== [ 30.977802][ T3006] BUG: KCSAN: data-race in dont_mount / lookup_fast [ 30.984721][ T3006] [ 30.987153][ T3006] read-write to 0xffff888106ddf240 of 4 bytes by task 3812 on cpu 1: [ 30.995242][ T3006] dont_mount+0x2a/0x40 [ 30.999423][ T3006] vfs_unlink+0x28f/0x420 [ 31.003872][ T3006] do_unlinkat+0x28e/0x4c0 [ 31.008345][ T3006] __x64_sys_unlink+0x2e/0x40 [ 31.013163][ T3006] x64_sys_call+0x22a6/0x2fb0 [ 31.017875][ T3006] do_syscall_64+0xd0/0x1a0 [ 31.022409][ T3006] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 31.028346][ T3006] [ 31.030683][ T3006] read to 0xffff888106ddf240 of 4 bytes by task 3006 on cpu 0: [ 31.038429][ T3006] lookup_fast+0xf0/0x320 [ 31.043322][ T3006] walk_component+0x3f/0x220 [ 31.048017][ T3006] path_lookupat+0xfe/0x2a0 [ 31.052654][ T3006] filename_lookup+0x147/0x340 [ 31.057637][ T3006] do_readlinkat+0x7d/0x320 [ 31.062148][ T3006] __x64_sys_readlink+0x47/0x60 [ 31.067095][ T3006] x64_sys_call+0x2cf3/0x2fb0 [ 31.071783][ T3006] do_syscall_64+0xd0/0x1a0 [ 31.076470][ T3006] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 31.082468][ T3006] [ 31.084806][ T3006] value changed: 0x00300008 -> 0x00004008 [ 31.090668][ T3006] [ 31.093089][ T3006] Reported by Kernel Concurrency Sanitizer on: [ 31.099261][ T3006] CPU: 0 UID: 0 PID: 3006 Comm: udevd Not tainted 6.15.0-rc6-syzkaller #0 PREEMPT(voluntary) [ 31.109773][ T3006] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 31.120103][ T3006] ==================================================================