last executing test programs: kernel console output (not intermixed with test programs): [ 21.035530][ T29] audit: type=1400 audit(1718670892.836:81): avc: denied { read } for pid=2765 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 Warning: Permanently added '10.128.0.142' (ED25519) to the list of known hosts. 2024/06/18 00:34:57 fuzzer started 2024/06/18 00:34:57 dialing manager at 10.128.0.163:30030 [ 25.815794][ T29] audit: type=1400 audit(1718670897.616:82): avc: denied { node_bind } for pid=3073 comm="syz-fuzzer" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 25.836383][ T29] audit: type=1400 audit(1718670897.616:83): avc: denied { name_bind } for pid=3073 comm="syz-fuzzer" src=6060 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 25.904076][ T29] audit: type=1400 audit(1718670897.706:84): avc: denied { mounton } for pid=3088 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 25.914932][ T3083] cgroup: Unknown subsys name 'net' [ 25.928980][ T29] audit: type=1400 audit(1718670897.706:85): avc: denied { mount } for pid=3088 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 25.964636][ T29] audit: type=1400 audit(1718670897.716:86): avc: denied { create } for pid=3092 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 25.985139][ T29] audit: type=1400 audit(1718670897.716:87): avc: denied { write } for pid=3092 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 25.997973][ T3085] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 26.005823][ T29] audit: type=1400 audit(1718670897.716:88): avc: denied { mounton } for pid=3083 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1926 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 26.037212][ T29] audit: type=1400 audit(1718670897.716:89): avc: denied { mount } for pid=3083 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 26.057835][ T3084] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 26.059572][ T29] audit: type=1400 audit(1718670897.746:90): avc: denied { read } for pid=3092 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 26.088483][ T29] audit: type=1400 audit(1718670897.756:91): avc: denied { unmount } for pid=3083 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 26.200182][ T3083] cgroup: Unknown subsys name 'rlimit' 2024/06/18 00:34:58 suppressing KCSAN reports in functions: '__xa_clear_mark' 'jbd2_journal_dirty_metadata' 'do_select' '__find_get_block' 'ext4_free_inodes_count' 2024/06/18 00:34:58 starting 5 executor processes [ 26.939563][ T3110] ================================================================== [ 26.947706][ T3110] BUG: KCSAN: data-race in pcpu_alloc_noprof / pcpu_balance_workfn [ 26.955697][ T3110] [ 26.958048][ T3110] read-write to 0xffffffff8841f6ac of 4 bytes by task 35 on cpu 1: [ 26.965948][ T3110] pcpu_balance_workfn+0x94e/0xa60 [ 26.971076][ T3110] process_scheduled_works+0x483/0x9a0 [ 26.976533][ T3110] worker_thread+0x526/0x730 [ 26.981141][ T3110] kthread+0x1d1/0x210 [ 26.985222][ T3110] ret_from_fork+0x4b/0x60 [ 26.989636][ T3110] ret_from_fork_asm+0x1a/0x30 [ 26.994403][ T3110] [ 26.996724][ T3110] read to 0xffffffff8841f6ac of 4 bytes by task 3110 on cpu 0: [ 27.004259][ T3110] pcpu_alloc_noprof+0x9a7/0x10c0 [ 27.009299][ T3110] ipv6_add_dev+0x2ee/0xab0 [ 27.013829][ T3110] addrconf_notify+0x407/0x950 [ 27.018600][ T3110] raw_notifier_call_chain+0x6f/0x1d0 [ 27.024004][ T3110] call_netdevice_notifiers_info+0xae/0x100 [ 27.029911][ T3110] register_netdevice+0xc54/0xdd0 [ 27.034936][ T3110] __ip_tunnel_create+0x1c5/0x270 [ 27.039964][ T3110] ip_tunnel_init_net+0x18a/0x3e0 [ 27.044992][ T3110] ipgre_tap_init_net+0x35/0x40 [ 27.049841][ T3110] ops_init+0x1ef/0x2b0 [ 27.054013][ T3110] setup_net+0x2ea/0x7c0 [ 27.058271][ T3110] copy_net_ns+0x37b/0x510 [ 27.062683][ T3110] create_new_namespaces+0x228/0x430 [ 27.067969][ T3110] unshare_nsproxy_namespaces+0xe6/0x120 [ 27.073603][ T3110] ksys_unshare+0x3da/0x720 [ 27.078106][ T3110] __x64_sys_unshare+0x1f/0x30 [ 27.082896][ T3110] x64_sys_call+0x2ca9/0x2d70 [ 27.087601][ T3110] do_syscall_64+0xc9/0x1c0 [ 27.092098][ T3110] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 27.097998][ T3110] [ 27.100315][ T3110] value changed: 0x00000001 -> 0x00000004 [ 27.106021][ T3110] [ 27.108335][ T3110] Reported by Kernel Concurrency Sanitizer on: [ 27.114484][ T3110] CPU: 0 PID: 3110 Comm: syz-executor.0 Not tainted 6.10.0-rc4-syzkaller-00007-g6226e74900d7 #0 [ 27.124896][ T3110] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 2024/06/18 00:34:58 SYZFATAL: failed to recv *flatrpc.HostMessageRaw: EOF [ 27.134948][ T3110] ================================================================== [ 27.153087][ T3101] chnl_net:caif_netlink_parms(): no params data found