last executing test programs: kernel console output (not intermixed with test programs): [ 17.663459][ T29] audit: type=1400 audit(1721929493.266:81): avc: denied { read } for pid=2769 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 Warning: Permanently added '10.128.1.195' (ED25519) to the list of known hosts. [ 21.619511][ T29] audit: type=1400 audit(1721929497.226:82): avc: denied { mounton } for pid=3073 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 21.620523][ T3073] cgroup: Unknown subsys name 'net' [ 21.642648][ T29] audit: type=1400 audit(1721929497.226:83): avc: denied { mount } for pid=3073 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 21.670780][ T29] audit: type=1400 audit(1721929497.256:84): avc: denied { unmount } for pid=3073 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 21.806745][ T3073] cgroup: Unknown subsys name 'rlimit' [ 21.929473][ T29] audit: type=1400 audit(1721929497.536:85): avc: denied { create } for pid=3073 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 21.950058][ T29] audit: type=1400 audit(1721929497.536:86): avc: denied { write } for pid=3073 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 21.958208][ T3077] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 21.970388][ T29] audit: type=1400 audit(1721929497.536:87): avc: denied { read } for pid=3073 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 21.999343][ T29] audit: type=1400 audit(1721929497.536:88): avc: denied { mounton } for pid=3073 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 22.024516][ T3073] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 22.024794][ T29] audit: type=1400 audit(1721929497.536:89): avc: denied { mount } for pid=3073 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 22.056803][ T29] audit: type=1400 audit(1721929497.596:90): avc: denied { relabelto } for pid=3077 comm="mkswap" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 22.082358][ T29] audit: type=1400 audit(1721929497.596:91): avc: denied { write } for pid=3077 comm="mkswap" path="/root/swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 22.139071][ T3073] ================================================================== [ 22.147328][ T3073] BUG: KCSAN: data-race in virtqueue_disable_cb / virtqueue_disable_cb [ 22.155658][ T3073] [ 22.157975][ T3073] write to 0xffff888100f6a878 of 2 bytes by interrupt on cpu 1: [ 22.165582][ T3073] virtqueue_disable_cb+0x85/0x180 [ 22.170682][ T3073] skb_xmit_done+0x5f/0x140 [ 22.175170][ T3073] vring_interrupt+0x157/0x180 [ 22.179920][ T3073] __handle_irq_event_percpu+0x95/0x490 [ 22.185452][ T3073] handle_irq_event+0x64/0xf0 [ 22.190392][ T3073] handle_edge_irq+0x16d/0x5b0 [ 22.195250][ T3073] __common_interrupt+0x58/0xe0 [ 22.200375][ T3073] common_interrupt+0x7c/0x90 [ 22.205042][ T3073] asm_common_interrupt+0x26/0x40 [ 22.210057][ T3073] acpi_safe_halt+0x21/0x30 [ 22.214534][ T3073] acpi_idle_do_entry+0x1d/0x30 [ 22.219362][ T3073] acpi_idle_enter+0x96/0xb0 [ 22.223961][ T3073] cpuidle_enter_state+0xcf/0x270 [ 22.229046][ T3073] cpuidle_enter+0x40/0x70 [ 22.233442][ T3073] do_idle+0x195/0x230 [ 22.237489][ T3073] cpu_startup_entry+0x25/0x30 [ 22.242229][ T3073] start_secondary+0x94/0xa0 [ 22.246797][ T3073] common_startup_64+0x12c/0x137 [ 22.251717][ T3073] [ 22.254016][ T3073] read to 0xffff888100f6a878 of 2 bytes by task 3073 on cpu 0: [ 22.261534][ T3073] virtqueue_disable_cb+0x63/0x180 [ 22.266624][ T3073] start_xmit+0x14b/0x1260 [ 22.271013][ T3073] dev_hard_start_xmit+0x119/0x3f0 [ 22.276107][ T3073] sch_direct_xmit+0x1b0/0x580 [ 22.280857][ T3073] __dev_queue_xmit+0xf3d/0x1fe0 [ 22.285784][ T3073] ip_finish_output2+0x73d/0x8b0 [ 22.290708][ T3073] ip_finish_output+0x11a/0x2a0 [ 22.295972][ T3073] ip_output+0xab/0x170 [ 22.300121][ T3073] __ip_queue_xmit+0xbcc/0xbf0 [ 22.305248][ T3073] ip_queue_xmit+0x38/0x50 [ 22.309660][ T3073] __tcp_transmit_skb+0x15b0/0x1970 [ 22.314841][ T3073] tcp_write_xmit+0x1273/0x31c0 [ 22.319679][ T3073] __tcp_push_pending_frames+0x6a/0x1a0 [ 22.325223][ T3073] tcp_rcv_established+0x953/0xef0 [ 22.330322][ T3073] tcp_v4_do_rcv+0x662/0x740 [ 22.334904][ T3073] sk_backlog_rcv+0x7a/0x1a0 [ 22.339480][ T3073] __release_sock+0xbb/0x140 [ 22.344154][ T3073] __sk_flush_backlog+0x2b/0xa0 [ 22.348989][ T3073] tcp_sendmsg_locked+0x1e55/0x2640 [ 22.354262][ T3073] tcp_sendmsg+0x30/0x50 [ 22.358500][ T3073] inet_sendmsg+0x77/0xd0 [ 22.362812][ T3073] __sock_sendmsg+0x102/0x180 [ 22.367463][ T3073] sock_write_iter+0x164/0x1b0 [ 22.372200][ T3073] vfs_write+0x78f/0x900 [ 22.376423][ T3073] ksys_write+0xeb/0x1b0 [ 22.380645][ T3073] __x64_sys_write+0x42/0x50 [ 22.385219][ T3073] x64_sys_call+0x2a40/0x2e00 [ 22.389886][ T3073] do_syscall_64+0xc9/0x1c0 [ 22.394366][ T3073] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 22.400266][ T3073] [ 22.402568][ T3073] value changed: 0x0000 -> 0x0001 [ 22.407565][ T3073] [ 22.409863][ T3073] Reported by Kernel Concurrency Sanitizer on: [ 22.416004][ T3073] CPU: 0 UID: 0 PID: 3073 Comm: syz-executor Not tainted 6.10.0-syzkaller-12381-gc33ffdb70cc6 #0 [ 22.426491][ T3073] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 22.436612][ T3073] ==================================================================